schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106061",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-05T05:01:00Z",
"trace_id": "0ce681aa-36b4-836c-d653-9e97a8966810"
} | {
"account_age_days": 1028,
"account_id": "ACCT-9E3496303B92",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_2",
"session_entropy": 0.476
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 287,
"timestamp": "2026-01-05T05:01:00Z",
"transaction_amount_usd": 1293908.01
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3897929.85,
"financial_exposure_usd": 4124257.84,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102507",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "medium",
"timestamp": "2026-01-02T17:47:00Z",
"trace_id": "929c64a3-b98c-502f-0cb2-dfde8e3d7d53"
} | {
"account_age_days": 530,
"account_id": "ACCT-94B8AA7061EA",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.131
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 383,
"timestamp": "2026-01-02T17:47:00Z",
"transaction_amount_usd": 93721.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.675,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 434449.49,
"financial_exposure_usd": 626091.51,
"recoverable_pct": 0.09
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104517",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "low",
"timestamp": "2026-01-04T03:17:00Z",
"trace_id": "8fa03834-6f0f-a84e-378f-f9f934eb2887"
} | {
"account_age_days": 111,
"account_id": "ACCT-1B774EE615F6",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_3",
"session_entropy": 0.343
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 286,
"timestamp": "2026-01-04T03:17:00Z",
"transaction_amount_usd": 1705173.09
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.918,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3779306.61,
"financial_exposure_usd": 6332584.37,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100530",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-01T08:50:00Z",
"trace_id": "ad714fa3-17b9-d89e-b71b-7fc75f4a0227"
} | {
"account_age_days": 1479,
"account_id": "ACCT-4DAFA6BD923B",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 597,
"timestamp": "2026-01-01T08:50:00Z",
"transaction_amount_usd": 15914.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 496430.76,
"financial_exposure_usd": 614844.11,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104027",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "high",
"timestamp": "2026-01-03T19:07:00Z",
"trace_id": "764fb732-8940-9662-d163-60c679a36bba"
} | {
"account_age_days": 229,
"account_id": "ACCT-BC291553403A",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_3",
"session_entropy": 0.781
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 342,
"timestamp": "2026-01-03T16:44:00Z",
"transaction_amount_usd": 22.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.928,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4972249.55,
"financial_exposure_usd": 7792715.04,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104664",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-04T05:44:00Z",
"trace_id": "cbb38314-cfba-ec60-74fe-899a943cb4e5"
} | {
"account_age_days": 1538,
"account_id": "ACCT-BDE3EB287F8A",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_2",
"session_entropy": 0.775
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 109,
"timestamp": "2026-01-04T05:44:00Z",
"transaction_amount_usd": 506150.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3151081.89,
"financial_exposure_usd": 6454449.63,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104621",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "medium",
"timestamp": "2026-01-04T05:01:00Z",
"trace_id": "ffb2c746-d528-b0c1-9cd2-358bd7ae1b8a"
} | {
"account_age_days": 1447,
"account_id": "ACCT-764B5EBBF7CF",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_3",
"session_entropy": 0.443
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 215,
"timestamp": "2026-01-04T05:01:00Z",
"transaction_amount_usd": 2972040.04
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.501,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5541427.38,
"financial_exposure_usd": 6468855.88,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101095",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "high",
"timestamp": "2026-01-01T18:15:00Z",
"trace_id": "1a78cafb-0c39-35c0-850a-995430437fa2"
} | {
"account_age_days": 1920,
"account_id": "ACCT-A27C4D0B197A",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_3",
"session_entropy": 0.541
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 593,
"timestamp": "2026-01-01T18:15:00Z",
"transaction_amount_usd": 66542.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.629,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 377251.44,
"financial_exposure_usd": 398612.24,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103105",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-03T03:45:00Z",
"trace_id": "6097ce57-e73a-67d0-43bb-ffebf2aebc2e"
} | {
"account_age_days": 1724,
"account_id": "ACCT-846A6CFFDBA6",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1038,
"timestamp": "2026-01-03T03:45:00Z",
"transaction_amount_usd": 62752.64
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.534,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 404763.25,
"financial_exposure_usd": 789106.26,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102471",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-02T17:11:00Z",
"trace_id": "d30d8f14-b96a-12c7-db1c-bc9205c4ff1c"
} | {
"account_age_days": 449,
"account_id": "ACCT-F4F9D7543C2A",
"baseline_risk_score": 0.477,
"kyc_tier": "tier_3",
"session_entropy": 0.232
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 322,
"timestamp": "2026-01-02T07:53:00Z",
"transaction_amount_usd": 5.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.516,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 549006.9,
"financial_exposure_usd": 1080130.92,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107911",
"label": "benign",
"label_confidence": 0.61,
"severity": "low",
"timestamp": "2026-01-06T11:51:00Z",
"trace_id": "6ff0a103-e9d9-05a7-fe6c-6c9b55ffb52f"
} | {
"account_age_days": 1254,
"account_id": "ACCT-F4769680E142",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 692,
"timestamp": "2026-01-06T11:51:00Z",
"transaction_amount_usd": 3644.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 974.68,
"financial_exposure_usd": 1704.3,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105478",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "high",
"timestamp": "2026-01-04T19:18:00Z",
"trace_id": "f97516bf-7462-5f89-fb04-012ead9ff088"
} | {
"account_age_days": 1556,
"account_id": "ACCT-6FDE8C0F5A17",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.655
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 898,
"timestamp": "2026-01-04T19:18:00Z",
"transaction_amount_usd": 2267025.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.482,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5638603.2,
"financial_exposure_usd": 7414906.27,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104693",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-04T06:13:00Z",
"trace_id": "c617ef35-c9a2-ecba-e0e5-9a9ca94bae4f"
} | {
"account_age_days": 301,
"account_id": "ACCT-9B54A95BB409",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_3",
"session_entropy": 0.906
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 460,
"timestamp": "2026-01-04T06:13:00Z",
"transaction_amount_usd": 693881.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.483,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3807959.66,
"financial_exposure_usd": 5358053.88,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109319",
"label": "benign",
"label_confidence": 0.622,
"severity": "low",
"timestamp": "2026-01-07T11:19:00Z",
"trace_id": "2de4fe64-802a-07c4-b293-bdccf98849b7"
} | {
"account_age_days": 1356,
"account_id": "ACCT-2295ACD67C69",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.791
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 92,
"timestamp": "2026-01-07T11:19:00Z",
"transaction_amount_usd": 1552.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 680.74,
"financial_exposure_usd": 1127.51,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104470",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-04T02:30:00Z",
"trace_id": "fc7f1a8c-8bdb-c77d-5a85-fcd096200279"
} | {
"account_age_days": 137,
"account_id": "ACCT-8330CA5D5EA0",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_3",
"session_entropy": 0.66
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 634,
"timestamp": "2026-01-04T02:30:00Z",
"transaction_amount_usd": 2807152.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.817,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1818068.19,
"financial_exposure_usd": 3815657.67,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109119",
"label": "benign",
"label_confidence": 0.533,
"severity": "high",
"timestamp": "2026-01-07T07:59:00Z",
"trace_id": "826a8827-b8cd-f058-33de-d47ad61be690"
} | {
"account_age_days": 335,
"account_id": "ACCT-D6BBE1EAFFBC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.927
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 533,
"timestamp": "2026-01-07T07:59:00Z",
"transaction_amount_usd": 13626.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2344.67,
"financial_exposure_usd": 4628.05,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102322",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-02T14:42:00Z",
"trace_id": "2c4cf510-b824-5553-febb-99ceb9f69182"
} | {
"account_age_days": 923,
"account_id": "ACCT-7D7BC381FA21",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 264,
"timestamp": "2026-01-02T03:45:00Z",
"transaction_amount_usd": 9.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.869,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 520402.76,
"financial_exposure_usd": 683701.81,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107955",
"label": "benign",
"label_confidence": 0.528,
"severity": "high",
"timestamp": "2026-01-06T12:35:00Z",
"trace_id": "24801e10-a755-0fe4-08e7-5fcfb7b6f396"
} | {
"account_age_days": 339,
"account_id": "ACCT-CC2D17E91A58",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.49
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 568,
"timestamp": "2026-01-06T12:35:00Z",
"transaction_amount_usd": 11131.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1772.33,
"financial_exposure_usd": 2358.86,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101598",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "critical",
"timestamp": "2026-01-02T02:38:00Z",
"trace_id": "bcc79b18-f936-c7a2-3a7e-d67823284f55"
} | {
"account_age_days": 1280,
"account_id": "ACCT-67020F43F3CF",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_1",
"session_entropy": 0.116
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 151,
"timestamp": "2026-01-01T23:24:00Z",
"transaction_amount_usd": 21.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 459983.37,
"financial_exposure_usd": 517460.66,
"recoverable_pct": 0.126
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109126",
"label": "benign",
"label_confidence": 0.597,
"severity": "low",
"timestamp": "2026-01-07T08:06:00Z",
"trace_id": "3078f0aa-1308-d1af-c396-97d8797deb82"
} | {
"account_age_days": 1643,
"account_id": "ACCT-04684C36CC78",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.798
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 222,
"timestamp": "2026-01-07T04:57:00Z",
"transaction_amount_usd": 5.47
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 685.37,
"financial_exposure_usd": 1030.75,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103118",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "high",
"timestamp": "2026-01-03T03:58:00Z",
"trace_id": "cd17a2c2-c5b8-72ce-b5d9-bf3c31371cfe"
} | {
"account_age_days": 667,
"account_id": "ACCT-12D531937D9F",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_1",
"session_entropy": 0.156
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 199,
"timestamp": "2026-01-03T03:58:00Z",
"transaction_amount_usd": 113319.92
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 102522.32,
"financial_exposure_usd": 175887.21,
"recoverable_pct": 0.267
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106407",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "medium",
"timestamp": "2026-01-05T10:47:00Z",
"trace_id": "e94408b2-b46f-943c-b396-b73bd87afd6e"
} | {
"account_age_days": 1460,
"account_id": "ACCT-B071D4B2F1A6",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_3",
"session_entropy": 0.69
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1149,
"timestamp": "2026-01-05T10:47:00Z",
"transaction_amount_usd": 1205830.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.861,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4913160.52,
"financial_exposure_usd": 7611088.3,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100872",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "critical",
"timestamp": "2026-01-01T14:32:00Z",
"trace_id": "c817ad2a-4059-7ac5-548d-ea6221ec505a"
} | {
"account_age_days": 262,
"account_id": "ACCT-9214FAF84573",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_3",
"session_entropy": 0.253
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1073,
"timestamp": "2026-01-01T14:32:00Z",
"transaction_amount_usd": 53116.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 470960.21,
"financial_exposure_usd": 1120353.98,
"recoverable_pct": 0.114
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108244",
"label": "benign",
"label_confidence": 0.702,
"severity": "high",
"timestamp": "2026-01-06T17:24:00Z",
"trace_id": "3cea2ddf-3059-f681-7107-99428f1a787d"
} | {
"account_age_days": 781,
"account_id": "ACCT-1C9D3F64C1E5",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_3",
"session_entropy": 0.109
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 667,
"timestamp": "2026-01-06T17:24:00Z",
"transaction_amount_usd": 11780.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1346.91,
"financial_exposure_usd": 2798.56,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109958",
"label": "benign",
"label_confidence": 0.668,
"severity": "high",
"timestamp": "2026-01-07T21:58:00Z",
"trace_id": "8ef79304-b0c0-e616-19ce-8bac61da2df3"
} | {
"account_age_days": 1225,
"account_id": "ACCT-B0C0CEC3CD63",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.188
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 365,
"timestamp": "2026-01-07T16:43:00Z",
"transaction_amount_usd": 20
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 925.69,
"financial_exposure_usd": 1586.7,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103566",
"label": "fraudulent",
"label_confidence": 0.65,
"severity": "high",
"timestamp": "2026-01-03T11:26:00Z",
"trace_id": "1574e41e-10b9-49d7-f96d-b94083535b32"
} | {
"account_age_days": 751,
"account_id": "ACCT-B3E6C0DC115A",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_1",
"session_entropy": 0.253
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 87,
"timestamp": "2026-01-03T11:26:00Z",
"transaction_amount_usd": 835635.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.748,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1690626.24,
"financial_exposure_usd": 2105666.27,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102159",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "low",
"timestamp": "2026-01-02T11:59:00Z",
"trace_id": "9a0e410d-05ef-8b3f-8332-e662772636a7"
} | {
"account_age_days": 1606,
"account_id": "ACCT-32B08FA394DD",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_3",
"session_entropy": 0.67
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 381,
"timestamp": "2026-01-02T05:40:00Z",
"transaction_amount_usd": 19.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 647051.4,
"financial_exposure_usd": 933972.5,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100796",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-01T13:16:00Z",
"trace_id": "894cdc78-6d9e-3fc4-6411-468065421627"
} | {
"account_age_days": 338,
"account_id": "ACCT-71BC0EADF23C",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.862
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 897,
"timestamp": "2026-01-01T13:16:00Z",
"transaction_amount_usd": 102872.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.524,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 257681.11,
"financial_exposure_usd": 445612.64,
"recoverable_pct": 0.388
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102684",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "medium",
"timestamp": "2026-01-02T20:44:00Z",
"trace_id": "7643a43e-0ec6-b149-2953-f38c09dba8a7"
} | {
"account_age_days": 640,
"account_id": "ACCT-D6F5821E1029",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.152
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 581,
"timestamp": "2026-01-02T20:44:00Z",
"transaction_amount_usd": 9108.08
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.443,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 258788.37,
"financial_exposure_usd": 438612.78,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106743",
"label": "benign",
"label_confidence": 0.495,
"severity": "high",
"timestamp": "2026-01-05T16:23:00Z",
"trace_id": "0bfa7a32-14aa-1b65-f5b6-7410da3413ec"
} | {
"account_age_days": 1909,
"account_id": "ACCT-320B86900743",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.131
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1005,
"timestamp": "2026-01-05T16:23:00Z",
"transaction_amount_usd": 6985.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2624.46,
"financial_exposure_usd": 2666.8,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107453",
"label": "benign",
"label_confidence": 0.632,
"severity": "critical",
"timestamp": "2026-01-06T04:13:00Z",
"trace_id": "83740005-21d6-fb27-4fe9-df58334851ef"
} | {
"account_age_days": 301,
"account_id": "ACCT-16913FF35A22",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_2",
"session_entropy": 0.227
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 364,
"timestamp": "2026-01-06T04:13:00Z",
"transaction_amount_usd": 6810.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1120.7,
"financial_exposure_usd": 1742.11,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109549",
"label": "benign",
"label_confidence": 0.486,
"severity": "medium",
"timestamp": "2026-01-07T15:09:00Z",
"trace_id": "9e92d285-e12b-62f3-e63f-f8e04cadf8ff"
} | {
"account_age_days": 21,
"account_id": "ACCT-5BAF9A673801",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 152,
"timestamp": "2026-01-07T10:35:00Z",
"transaction_amount_usd": 14.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4482.7,
"financial_exposure_usd": 4536.06,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100281",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "low",
"timestamp": "2026-01-01T04:41:00Z",
"trace_id": "2046eeb5-9888-d27b-b1e5-2a9006506312"
} | {
"account_age_days": 356,
"account_id": "ACCT-94F6614EE89A",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_3",
"session_entropy": 0.508
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 92,
"timestamp": "2026-01-01T04:41:00Z",
"transaction_amount_usd": 14186.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.549,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1067033.03,
"financial_exposure_usd": 1160146.9,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104148",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-03T21:08:00Z",
"trace_id": "977fc79c-e7bc-da14-e885-ac747c05936d"
} | {
"account_age_days": 885,
"account_id": "ACCT-04D4AEAE8754",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_1",
"session_entropy": 0.341
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 197,
"timestamp": "2026-01-03T10:00:00Z",
"transaction_amount_usd": 20.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1652160.42,
"financial_exposure_usd": 4082502.63,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107740",
"label": "benign",
"label_confidence": 0.52,
"severity": "low",
"timestamp": "2026-01-06T09:00:00Z",
"trace_id": "5c94322e-a65f-8260-62a0-383436d2ada3"
} | {
"account_age_days": 71,
"account_id": "ACCT-EE9D0CC814D7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.547
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 139,
"timestamp": "2026-01-06T01:12:00Z",
"transaction_amount_usd": 17.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2254.93,
"financial_exposure_usd": 3251.75,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102598",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "high",
"timestamp": "2026-01-02T19:18:00Z",
"trace_id": "c68b6960-9c23-e0f8-8150-31ffeaa7f2a2"
} | {
"account_age_days": 214,
"account_id": "ACCT-57CB2E4645F7",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.188
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 230,
"timestamp": "2026-01-02T19:18:00Z",
"transaction_amount_usd": 32481.31
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 247028.25,
"financial_exposure_usd": 599956.98,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102639",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "low",
"timestamp": "2026-01-02T19:59:00Z",
"trace_id": "c0259cf5-1399-da7a-4a13-543e952b4822"
} | {
"account_age_days": 717,
"account_id": "ACCT-AFA539D4DD0F",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_2",
"session_entropy": 0.666
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 301,
"timestamp": "2026-01-02T19:59:00Z",
"transaction_amount_usd": 60584.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.916,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 212496.28,
"financial_exposure_usd": 312186.32,
"recoverable_pct": 0.305
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103215",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-03T05:35:00Z",
"trace_id": "f47d9907-73c9-8179-225b-89e6539ff7f1"
} | {
"account_age_days": 458,
"account_id": "ACCT-B0BD3D0EEAC6",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_3",
"session_entropy": 0.195
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 135,
"timestamp": "2026-01-03T03:20:00Z",
"transaction_amount_usd": 2.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 748296.86,
"financial_exposure_usd": 838726.35,
"recoverable_pct": 0.115
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105581",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "high",
"timestamp": "2026-01-04T21:01:00Z",
"trace_id": "31552245-9016-f02e-491a-18a3ee058381"
} | {
"account_age_days": 1047,
"account_id": "ACCT-D1489746D1F3",
"baseline_risk_score": 0.235,
"kyc_tier": "tier_2",
"session_entropy": 0.351
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 297,
"timestamp": "2026-01-04T12:23:00Z",
"transaction_amount_usd": 0.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3177255.36,
"financial_exposure_usd": 5354213.69,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106531",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "critical",
"timestamp": "2026-01-05T12:51:00Z",
"trace_id": "e46c2c9f-ec4c-e1ce-a7a7-f5539b2e81c1"
} | {
"account_age_days": 1319,
"account_id": "ACCT-5414C33B2D8C",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_3",
"session_entropy": 0.782
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 395,
"timestamp": "2026-01-05T10:50:00Z",
"transaction_amount_usd": 19.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6775630.05,
"financial_exposure_usd": 7829500.76,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103643",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "low",
"timestamp": "2026-01-03T12:43:00Z",
"trace_id": "3bb6c06a-eb38-2dd8-8ce6-3d48ce7f8a27"
} | {
"account_age_days": 1030,
"account_id": "ACCT-CB3F3B12E6B8",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_2",
"session_entropy": 0.898
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 257,
"timestamp": "2026-01-03T08:45:00Z",
"transaction_amount_usd": 8.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1327642.04,
"financial_exposure_usd": 2042896.25,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107583",
"label": "benign",
"label_confidence": 0.517,
"severity": "low",
"timestamp": "2026-01-06T06:23:00Z",
"trace_id": "8c3c224e-e553-307e-4395-8d94c43b1fe2"
} | {
"account_age_days": 833,
"account_id": "ACCT-C8CA46674DE4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.912
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 296,
"timestamp": "2026-01-05T17:43:00Z",
"transaction_amount_usd": 20.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 531.18,
"financial_exposure_usd": 685.39,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101266",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "critical",
"timestamp": "2026-01-01T21:06:00Z",
"trace_id": "d04b7e5d-267a-c06e-4d72-5d652944d364"
} | {
"account_age_days": 1857,
"account_id": "ACCT-CE840AEB53BA",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_1",
"session_entropy": 0.738
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 243,
"timestamp": "2026-01-01T15:11:00Z",
"transaction_amount_usd": 10.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.516,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 348059.4,
"financial_exposure_usd": 491174.22,
"recoverable_pct": 0.289
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100600",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-01T10:00:00Z",
"trace_id": "1b90eccb-5717-0190-960f-765d52c7eb4b"
} | {
"account_age_days": 1614,
"account_id": "ACCT-402D45473671",
"baseline_risk_score": 0.52,
"kyc_tier": "tier_1",
"session_entropy": 0.868
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 991,
"timestamp": "2026-01-01T10:00:00Z",
"transaction_amount_usd": 92182.67
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.829,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 560523.32,
"financial_exposure_usd": 779349.47,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108480",
"label": "benign",
"label_confidence": 0.695,
"severity": "high",
"timestamp": "2026-01-06T21:20:00Z",
"trace_id": "5448d286-1eae-d913-a0db-060465778b63"
} | {
"account_age_days": 716,
"account_id": "ACCT-6B23891BF0AE",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_3",
"session_entropy": 0.942
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 102,
"timestamp": "2026-01-06T14:12:00Z",
"transaction_amount_usd": 8.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.502,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1391.84,
"financial_exposure_usd": 2561.91,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102662",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "medium",
"timestamp": "2026-01-02T20:22:00Z",
"trace_id": "639eba1e-837c-2da8-61cc-ce05781aa3e2"
} | {
"account_age_days": 481,
"account_id": "ACCT-8D503CB356FE",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_3",
"session_entropy": 0.262
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 856,
"timestamp": "2026-01-02T20:22:00Z",
"transaction_amount_usd": 14243.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.399,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 701243.23,
"financial_exposure_usd": 841098.38,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109757",
"label": "benign",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-07T18:37:00Z",
"trace_id": "8de81529-c39d-ec47-bad0-ee0fdf6e4319"
} | {
"account_age_days": 319,
"account_id": "ACCT-DE353B960CA6",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.904
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 906,
"timestamp": "2026-01-07T18:37:00Z",
"transaction_amount_usd": 5433.17
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 875.58,
"financial_exposure_usd": 895.11,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105003",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-04T11:23:00Z",
"trace_id": "c6ce8925-c9d2-3bfd-2658-3ccde51be6b9"
} | {
"account_age_days": 412,
"account_id": "ACCT-4033108CADE6",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 663,
"timestamp": "2026-01-04T11:23:00Z",
"transaction_amount_usd": 2229454.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.72,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1907892.13,
"financial_exposure_usd": 2654611.21,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109669",
"label": "benign",
"label_confidence": 0.464,
"severity": "critical",
"timestamp": "2026-01-07T17:09:00Z",
"trace_id": "33067766-c5ab-9e51-e398-3191eb48a854"
} | {
"account_age_days": 575,
"account_id": "ACCT-81A0462C54CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.358
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 390,
"timestamp": "2026-01-07T15:31:00Z",
"transaction_amount_usd": 7.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1616.42,
"financial_exposure_usd": 2596.32,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105360",
"label": "fraudulent",
"label_confidence": 0.652,
"severity": "medium",
"timestamp": "2026-01-04T17:20:00Z",
"trace_id": "1acee9ff-8f9f-590f-4bbf-73d7afa58816"
} | {
"account_age_days": 62,
"account_id": "ACCT-C5AD5473968A",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_1",
"session_entropy": 0.665
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 206,
"timestamp": "2026-01-04T10:08:00Z",
"transaction_amount_usd": 20.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.598,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4331119.68,
"financial_exposure_usd": 4667187.77,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106908",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-05T19:08:00Z",
"trace_id": "3f302b6f-9292-cfc1-feac-ba46eea89e91"
} | {
"account_age_days": 631,
"account_id": "ACCT-845F9AB47460",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 565,
"timestamp": "2026-01-05T19:08:00Z",
"transaction_amount_usd": 13544.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3409.76,
"financial_exposure_usd": 4591.78,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100870",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-01T14:30:00Z",
"trace_id": "b6f464ec-f6c6-eeb2-ea19-0829cc4b277f"
} | {
"account_age_days": 1089,
"account_id": "ACCT-F219FE1788F8",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_1",
"session_entropy": 0.782
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 167,
"timestamp": "2026-01-01T04:22:00Z",
"transaction_amount_usd": 4.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.792,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 715200.19,
"financial_exposure_usd": 863984.9,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103736",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "medium",
"timestamp": "2026-01-03T14:16:00Z",
"trace_id": "85114b86-6e38-01ae-5c78-7c167cc0ce3e"
} | {
"account_age_days": 1356,
"account_id": "ACCT-D6A892486FF9",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 255,
"timestamp": "2026-01-03T08:45:00Z",
"transaction_amount_usd": 12.59
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.867,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3555382.23,
"financial_exposure_usd": 6314756.48,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107802",
"label": "benign",
"label_confidence": 0.578,
"severity": "medium",
"timestamp": "2026-01-06T10:02:00Z",
"trace_id": "ca17fbed-6a91-64ed-a263-fd125011eefc"
} | {
"account_age_days": 1659,
"account_id": "ACCT-505A51D43741",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1077,
"timestamp": "2026-01-06T10:02:00Z",
"transaction_amount_usd": 8411.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5668.04,
"financial_exposure_usd": 6557.98,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102840",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "high",
"timestamp": "2026-01-02T23:20:00Z",
"trace_id": "1f64405d-84a9-9303-7793-8e9efdc5c2f9"
} | {
"account_age_days": 1946,
"account_id": "ACCT-1D94850E325E",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_3",
"session_entropy": 0.609
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 217,
"timestamp": "2026-01-02T16:12:00Z",
"transaction_amount_usd": 10.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 34696.22,
"financial_exposure_usd": 82149.77,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108387",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-06T19:47:00Z",
"trace_id": "1b33643e-9847-d604-1235-0f03311262f6"
} | {
"account_age_days": 1427,
"account_id": "ACCT-0CDBC951FFA1",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_1",
"session_entropy": 0.248
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 210,
"timestamp": "2026-01-06T07:21:00Z",
"transaction_amount_usd": 9.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2230.77,
"financial_exposure_usd": 3475.67,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108236",
"label": "benign",
"label_confidence": 0.509,
"severity": "medium",
"timestamp": "2026-01-06T17:16:00Z",
"trace_id": "f77f15cb-5de8-66cb-9e47-5064d92f6299"
} | {
"account_age_days": 349,
"account_id": "ACCT-17D2182D8CB9",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_1",
"session_entropy": 0.386
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 646,
"timestamp": "2026-01-06T17:16:00Z",
"transaction_amount_usd": 10460.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.616,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1360.97,
"financial_exposure_usd": 3239.09,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100462",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "high",
"timestamp": "2026-01-01T07:42:00Z",
"trace_id": "069a4fb9-be14-a4b7-bf4e-70d9b1966dd3"
} | {
"account_age_days": 1632,
"account_id": "ACCT-661D5CA427B2",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_3",
"session_entropy": 0.544
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 676,
"timestamp": "2026-01-01T07:42:00Z",
"transaction_amount_usd": 20505.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 675142.5,
"financial_exposure_usd": 721191.66,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101570",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-02T02:10:00Z",
"trace_id": "956e0465-c391-2288-5c1c-9dd8e05dcc38"
} | {
"account_age_days": 1120,
"account_id": "ACCT-3F5509745595",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_2",
"session_entropy": 0.786
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 203,
"timestamp": "2026-01-02T02:10:00Z",
"transaction_amount_usd": 5401.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.569,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 849284.42,
"financial_exposure_usd": 1262655.27,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101246",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-01T20:46:00Z",
"trace_id": "4680adb1-b238-b0e9-a507-51eeb3cb7288"
} | {
"account_age_days": 720,
"account_id": "ACCT-1E15236A2359",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.832
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 944,
"timestamp": "2026-01-01T20:46:00Z",
"transaction_amount_usd": 75614.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.512,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1070780.49,
"financial_exposure_usd": 1156761.77,
"recoverable_pct": 0.389
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105124",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-04T13:24:00Z",
"trace_id": "269450f0-5168-cd96-88ae-055e0050288f"
} | {
"account_age_days": 227,
"account_id": "ACCT-4C18B07B219A",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_3",
"session_entropy": 0.582
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 779,
"timestamp": "2026-01-04T13:24:00Z",
"transaction_amount_usd": 1627367.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.418,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7152887.85,
"financial_exposure_usd": 7801296.47,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105560",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "low",
"timestamp": "2026-01-04T20:40:00Z",
"trace_id": "954ef142-a65b-5e1b-e7f0-4567a3e14f1b"
} | {
"account_age_days": 1129,
"account_id": "ACCT-F75B29767820",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_3",
"session_entropy": 0.264
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 916,
"timestamp": "2026-01-04T20:40:00Z",
"transaction_amount_usd": 2694349.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3749639.97,
"financial_exposure_usd": 5276094.44,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103891",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "high",
"timestamp": "2026-01-03T16:51:00Z",
"trace_id": "b0869af7-fd18-4907-4936-cae6a504ec18"
} | {
"account_age_days": 1461,
"account_id": "ACCT-DE59452A6C8C",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_2",
"session_entropy": 0.807
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1115,
"timestamp": "2026-01-03T16:51:00Z",
"transaction_amount_usd": 2481037.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2112086.87,
"financial_exposure_usd": 2744442.84,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107770",
"label": "benign",
"label_confidence": 0.507,
"severity": "high",
"timestamp": "2026-01-06T09:30:00Z",
"trace_id": "9d4e4f60-dab1-5d53-fd19-4602814c1094"
} | {
"account_age_days": 296,
"account_id": "ACCT-0C087BD0398B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.324
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 630,
"timestamp": "2026-01-06T09:30:00Z",
"transaction_amount_usd": 8086.12
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1957.39,
"financial_exposure_usd": 3172.53,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105858",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "critical",
"timestamp": "2026-01-05T01:38:00Z",
"trace_id": "ef6f2616-cc7c-3bdb-8535-c9fd5b42d707"
} | {
"account_age_days": 1079,
"account_id": "ACCT-DA0C82B952EB",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_1",
"session_entropy": 0.602
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 340,
"timestamp": "2026-01-04T15:43:00Z",
"transaction_amount_usd": 5.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.512,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4872189.06,
"financial_exposure_usd": 7849629.01,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101592",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "critical",
"timestamp": "2026-01-02T02:32:00Z",
"trace_id": "b3663f69-7b65-8187-c302-20f64ccfd47b"
} | {
"account_age_days": 1420,
"account_id": "ACCT-86182C978D6F",
"baseline_risk_score": 0.492,
"kyc_tier": "tier_1",
"session_entropy": 0.469
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 323,
"timestamp": "2026-01-02T01:42:00Z",
"transaction_amount_usd": 8.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.556,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 250216.59,
"financial_exposure_usd": 497014.73,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109646",
"label": "benign",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-07T16:46:00Z",
"trace_id": "a7d1ebf4-9951-5f39-f2d9-1879579a0b24"
} | {
"account_age_days": 1235,
"account_id": "ACCT-B69B4A6F230A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.365
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1060,
"timestamp": "2026-01-07T16:46:00Z",
"transaction_amount_usd": 2957.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1927.25,
"financial_exposure_usd": 2628.42,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108941",
"label": "benign",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-07T05:01:00Z",
"trace_id": "a3e5f573-e0b4-e6b1-1842-4f0740bed280"
} | {
"account_age_days": 390,
"account_id": "ACCT-5957439FE5BC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.729
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1154,
"timestamp": "2026-01-07T05:01:00Z",
"transaction_amount_usd": 1477.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.488,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1250.37,
"financial_exposure_usd": 2039.71,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102884",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "critical",
"timestamp": "2026-01-03T00:04:00Z",
"trace_id": "3a5301d0-8805-4a8c-6d67-9d87ac09ddc7"
} | {
"account_age_days": 943,
"account_id": "ACCT-C638D8F0D305",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_1",
"session_entropy": 0.794
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 306,
"timestamp": "2026-01-02T11:44:00Z",
"transaction_amount_usd": 5.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 746448.2,
"financial_exposure_usd": 1317560.13,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109046",
"label": "benign",
"label_confidence": 0.601,
"severity": "medium",
"timestamp": "2026-01-07T06:46:00Z",
"trace_id": "cfc60d4a-fa9f-7c12-1ef9-4b5c45f558d8"
} | {
"account_age_days": 577,
"account_id": "ACCT-9AA92B64023E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.792
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 685,
"timestamp": "2026-01-07T06:46:00Z",
"transaction_amount_usd": 9585.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.744,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 655.65,
"financial_exposure_usd": 1124.64,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105918",
"label": "fraudulent",
"label_confidence": 0.653,
"severity": "medium",
"timestamp": "2026-01-05T02:38:00Z",
"trace_id": "13002a3f-9c17-8f01-fb1f-4a0e2dafafab"
} | {
"account_age_days": 1144,
"account_id": "ACCT-E35EF21A1AB9",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_1",
"session_entropy": 0.94
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1193,
"timestamp": "2026-01-05T02:38:00Z",
"transaction_amount_usd": 2621070.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.362,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2863663.39,
"financial_exposure_usd": 2903376.69,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106095",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "critical",
"timestamp": "2026-01-05T05:35:00Z",
"trace_id": "c83f1de0-fc73-cfbe-26b0-dbb22fda2e13"
} | {
"account_age_days": 1425,
"account_id": "ACCT-81C1BF096FC1",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.819
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 358,
"timestamp": "2026-01-05T03:52:00Z",
"transaction_amount_usd": 18.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2252860.67,
"financial_exposure_usd": 2786741.69,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109799",
"label": "benign",
"label_confidence": 0.583,
"severity": "medium",
"timestamp": "2026-01-07T19:19:00Z",
"trace_id": "8c17d7c4-c0de-a680-bf29-896e8a8cd6f6"
} | {
"account_age_days": 1855,
"account_id": "ACCT-EAC255B9E495",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.944
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 393,
"timestamp": "2026-01-07T12:47:00Z",
"transaction_amount_usd": 20.82
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 323.67,
"financial_exposure_usd": 626.15,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106572",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-05T13:32:00Z",
"trace_id": "40cc9e38-da17-3bf5-0a00-10c95c544c39"
} | {
"account_age_days": 48,
"account_id": "ACCT-7FCEA99AB057",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.762
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 298,
"timestamp": "2026-01-05T08:40:00Z",
"transaction_amount_usd": 24.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.385,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2369501.04,
"financial_exposure_usd": 5800159.85,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104980",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "medium",
"timestamp": "2026-01-04T11:00:00Z",
"trace_id": "b09997a5-f8a4-1fe5-0e9e-21e93b368458"
} | {
"account_age_days": 1251,
"account_id": "ACCT-8EBC90AC2B32",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 431,
"timestamp": "2026-01-04T11:00:00Z",
"transaction_amount_usd": 2308809.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.72,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3237494.68,
"financial_exposure_usd": 5666209.34,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100380",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "critical",
"timestamp": "2026-01-01T06:20:00Z",
"trace_id": "493bafc4-1547-c5db-1573-223d7f7ba12a"
} | {
"account_age_days": 1820,
"account_id": "ACCT-E0778FCECB03",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.287
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 769,
"timestamp": "2026-01-01T06:20:00Z",
"transaction_amount_usd": 23511.53
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.833,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 475447.64,
"financial_exposure_usd": 932529.64,
"recoverable_pct": 0.238
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107889",
"label": "benign",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-06T11:29:00Z",
"trace_id": "be2760e7-cd89-79c6-f4db-7801539caf2e"
} | {
"account_age_days": 1042,
"account_id": "ACCT-15A4DBBB9F0A",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_2",
"session_entropy": 0.312
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 978,
"timestamp": "2026-01-06T11:29:00Z",
"transaction_amount_usd": 12269.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1706,
"financial_exposure_usd": 1846.53,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105969",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-05T03:29:00Z",
"trace_id": "004d7745-b95a-8551-28e6-61dbfd619cd9"
} | {
"account_age_days": 375,
"account_id": "ACCT-9D3F3BCE612B",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 371,
"timestamp": "2026-01-04T17:30:00Z",
"transaction_amount_usd": 13.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.377,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4566589.29,
"financial_exposure_usd": 7349037.4,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107650",
"label": "benign",
"label_confidence": 0.692,
"severity": "low",
"timestamp": "2026-01-06T07:30:00Z",
"trace_id": "28cfb74a-bd11-5c90-f166-86785e6124e8"
} | {
"account_age_days": 1716,
"account_id": "ACCT-14ADDC482C59",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_2",
"session_entropy": 0.926
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 341,
"timestamp": "2026-01-06T00:45:00Z",
"transaction_amount_usd": 13.34
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1679.34,
"financial_exposure_usd": 2695.31,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107655",
"label": "benign",
"label_confidence": 0.672,
"severity": "low",
"timestamp": "2026-01-06T07:35:00Z",
"trace_id": "67464104-2ec0-39e7-fd92-9127994b8176"
} | {
"account_age_days": 1227,
"account_id": "ACCT-C78706B6CC40",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.216
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 570,
"timestamp": "2026-01-06T07:35:00Z",
"transaction_amount_usd": 4473.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.461,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1169.52,
"financial_exposure_usd": 1817.48,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103296",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-03T06:56:00Z",
"trace_id": "58f4bb16-e969-7b86-660d-1ef05a903ae8"
} | {
"account_age_days": 1897,
"account_id": "ACCT-C6AB5FC66375",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 718,
"timestamp": "2026-01-03T06:56:00Z",
"transaction_amount_usd": 63390.21
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.398,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 355811.75,
"financial_exposure_usd": 357815.06,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104250",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-03T22:50:00Z",
"trace_id": "5e7ef29e-7d77-dfbc-a9e0-ca4b556ca58e"
} | {
"account_age_days": 711,
"account_id": "ACCT-C5876B196F7D",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 261,
"timestamp": "2026-01-03T22:50:00Z",
"transaction_amount_usd": 274081.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2802707.42,
"financial_exposure_usd": 4114519.39,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109998",
"label": "benign",
"label_confidence": 0.659,
"severity": "medium",
"timestamp": "2026-01-07T22:38:00Z",
"trace_id": "d4f8cbc7-d0b9-5960-04bc-d822615fb240"
} | {
"account_age_days": 703,
"account_id": "ACCT-409B0DE354BD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.225
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 414,
"timestamp": "2026-01-07T22:38:00Z",
"transaction_amount_usd": 6052.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.46,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1187.15,
"financial_exposure_usd": 1744.08,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100962",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "critical",
"timestamp": "2026-01-01T16:02:00Z",
"trace_id": "90adfa1f-fe1d-e3e1-8422-e552e9883cd5"
} | {
"account_age_days": 372,
"account_id": "ACCT-549510F46DCF",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.58
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 967,
"timestamp": "2026-01-01T16:02:00Z",
"transaction_amount_usd": 12600.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.707,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 926913.68,
"financial_exposure_usd": 1004964.74,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109651",
"label": "benign",
"label_confidence": 0.625,
"severity": "low",
"timestamp": "2026-01-07T16:51:00Z",
"trace_id": "9afa8d13-d502-e741-e660-fee7c9cd249b"
} | {
"account_age_days": 1524,
"account_id": "ACCT-9438A32ACE8F",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 359,
"timestamp": "2026-01-07T16:51:00Z",
"transaction_amount_usd": 560.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.688,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3990.8,
"financial_exposure_usd": 5208.79,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109798",
"label": "benign",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-07T19:18:00Z",
"trace_id": "a6d80f1b-7c1e-7ef9-85e9-1ebe0438c9b2"
} | {
"account_age_days": 1705,
"account_id": "ACCT-02580A12FF34",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.894
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 107,
"timestamp": "2026-01-07T07:42:00Z",
"transaction_amount_usd": 8.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.592,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 860.27,
"financial_exposure_usd": 1934.64,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101220",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-01T20:20:00Z",
"trace_id": "a477c208-52f8-ad10-ad73-c66e2368041a"
} | {
"account_age_days": 386,
"account_id": "ACCT-4489FE7B0B50",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_2",
"session_entropy": 0.829
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 891,
"timestamp": "2026-01-01T20:20:00Z",
"transaction_amount_usd": 3003.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.948,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1125211.45,
"financial_exposure_usd": 1440403.08,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102221",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "critical",
"timestamp": "2026-01-02T13:01:00Z",
"trace_id": "6fc5e37c-aa4a-a287-2378-3a163a6d248e"
} | {
"account_age_days": 451,
"account_id": "ACCT-BB7453A5535E",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.168
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 868,
"timestamp": "2026-01-02T13:01:00Z",
"transaction_amount_usd": 112929.94
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.385,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 273364.76,
"financial_exposure_usd": 650250.44,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104726",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "low",
"timestamp": "2026-01-04T06:46:00Z",
"trace_id": "f2d7ab9d-55d4-ef89-cdbd-4b0179320f3b"
} | {
"account_age_days": 1562,
"account_id": "ACCT-131912B4113E",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_1",
"session_entropy": 0.704
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 323,
"timestamp": "2026-01-04T06:46:00Z",
"transaction_amount_usd": 927969.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5013660.5,
"financial_exposure_usd": 8506582.18,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103405",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-03T08:45:00Z",
"trace_id": "6af71409-54fa-995e-f701-57f3d4726814"
} | {
"account_age_days": 1948,
"account_id": "ACCT-8381E6364C71",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.511
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1000,
"timestamp": "2026-01-03T08:45:00Z",
"transaction_amount_usd": 653879.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2594620.28,
"financial_exposure_usd": 2620753.1,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102113",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-02T11:13:00Z",
"trace_id": "f4caf8ac-410b-1d17-0b82-7d601e8893dc"
} | {
"account_age_days": 1588,
"account_id": "ACCT-9A0C1C42FCFD",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_3",
"session_entropy": 0.331
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 141,
"timestamp": "2026-01-02T11:13:00Z",
"transaction_amount_usd": 63565.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.375,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 2",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 548646.43,
"financial_exposure_usd": 879676.64,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102318",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "medium",
"timestamp": "2026-01-02T14:38:00Z",
"trace_id": "edcbcbdb-157f-2896-104a-3e3aea341874"
} | {
"account_age_days": 1051,
"account_id": "ACCT-B63812CA24EC",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_2",
"session_entropy": 0.137
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 257,
"timestamp": "2026-01-02T05:00:00Z",
"transaction_amount_usd": 4.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 801254.83,
"financial_exposure_usd": 810187.52,
"recoverable_pct": 0.339
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106049",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "high",
"timestamp": "2026-01-05T04:49:00Z",
"trace_id": "08e1a193-dee1-aed8-7361-dab219d4ceab"
} | {
"account_age_days": 179,
"account_id": "ACCT-7B7DA6081B0D",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_2",
"session_entropy": 0.883
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 902,
"timestamp": "2026-01-05T04:49:00Z",
"transaction_amount_usd": 934390.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.431,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1073736.51,
"financial_exposure_usd": 1743701.86,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107928",
"label": "benign",
"label_confidence": 0.722,
"severity": "critical",
"timestamp": "2026-01-06T12:08:00Z",
"trace_id": "35de0c0d-211e-d155-0aad-7d2101ce6d7f"
} | {
"account_age_days": 1616,
"account_id": "ACCT-CBB56A02CF1C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.364
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1089,
"timestamp": "2026-01-06T12:08:00Z",
"transaction_amount_usd": 14219.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1300.07,
"financial_exposure_usd": 2071.28,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103295",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-03T06:55:00Z",
"trace_id": "40e07926-ddbe-78c4-0ec7-adf61a9d4673"
} | {
"account_age_days": 1934,
"account_id": "ACCT-FB5A82D97B9C",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_3",
"session_entropy": 0.708
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 383,
"timestamp": "2026-01-03T00:32:00Z",
"transaction_amount_usd": 17.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.788,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1126947.5,
"financial_exposure_usd": 1407207.82,
"recoverable_pct": 0.005
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108038",
"label": "benign",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-06T13:58:00Z",
"trace_id": "34ed9841-7d67-9762-55e1-159093fdeb80"
} | {
"account_age_days": 1320,
"account_id": "ACCT-434CABF86FEA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.408
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 240,
"timestamp": "2026-01-06T13:58:00Z",
"transaction_amount_usd": 13575.32
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 5057.63,
"financial_exposure_usd": 6563.12,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100693",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "high",
"timestamp": "2026-01-01T11:33:00Z",
"trace_id": "6b107e6a-ee9e-d00d-26f9-466e55759b79"
} | {
"account_age_days": 1513,
"account_id": "ACCT-BA78190A6146",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_1",
"session_entropy": 0.667
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 282,
"timestamp": "2026-01-01T02:15:00Z",
"transaction_amount_usd": 11.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.484,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 297371.54,
"financial_exposure_usd": 429356.34,
"recoverable_pct": 0.418
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107717",
"label": "benign",
"label_confidence": 0.493,
"severity": "high",
"timestamp": "2026-01-06T08:37:00Z",
"trace_id": "f2d0407b-b922-c995-625b-3c8937cd9ff5"
} | {
"account_age_days": 1732,
"account_id": "ACCT-4228D4108FA6",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_2",
"session_entropy": 0.638
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 370,
"timestamp": "2026-01-06T03:45:00Z",
"transaction_amount_usd": 10.18
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4702.37,
"financial_exposure_usd": 8624.73,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105795",
"label": "fraudulent",
"label_confidence": 0.643,
"severity": "medium",
"timestamp": "2026-01-05T00:35:00Z",
"trace_id": "309004f3-3386-c87e-0f20-4014edbfacb9"
} | {
"account_age_days": 1106,
"account_id": "ACCT-BCB582A36419",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_2",
"session_entropy": 0.219
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 195,
"timestamp": "2026-01-04T15:09:00Z",
"transaction_amount_usd": 23.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.418,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2828261.39,
"financial_exposure_usd": 4285940.27,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106154",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "medium",
"timestamp": "2026-01-05T06:34:00Z",
"trace_id": "6cfa2597-a636-5de4-f613-e6d1da926e46"
} | {
"account_age_days": 17,
"account_id": "ACCT-44C5F45FD530",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_2",
"session_entropy": 0.904
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 536,
"timestamp": "2026-01-05T06:34:00Z",
"transaction_amount_usd": 151111.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.632,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2400351.12,
"financial_exposure_usd": 5554922.25,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.