schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105435",
"label": "fraudulent",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-04T18:35:00Z",
"trace_id": "7af56ec2-4f29-01b4-91aa-b93e720948e9"
} | {
"account_age_days": 1230,
"account_id": "ACCT-4C4F29CD8510",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.758
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 709,
"timestamp": "2026-01-04T18:35:00Z",
"transaction_amount_usd": 129161.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2827025.25,
"financial_exposure_usd": 3204367.62,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109022",
"label": "benign",
"label_confidence": 0.635,
"severity": "critical",
"timestamp": "2026-01-07T06:22:00Z",
"trace_id": "89d02670-4274-f666-d3e6-785d25461f59"
} | {
"account_age_days": 206,
"account_id": "ACCT-594DB4C24165",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.665
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1137,
"timestamp": "2026-01-07T06:22:00Z",
"transaction_amount_usd": 5477.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.624,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 998.93,
"financial_exposure_usd": 1808.42,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107801",
"label": "benign",
"label_confidence": 0.49,
"severity": "medium",
"timestamp": "2026-01-06T10:01:00Z",
"trace_id": "abeed24d-bd12-e445-1110-118c59c14c77"
} | {
"account_age_days": 1471,
"account_id": "ACCT-CB3674C3BFFE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.754
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 199,
"timestamp": "2026-01-06T05:29:00Z",
"transaction_amount_usd": 10.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.703,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2069.14,
"financial_exposure_usd": 3514.05,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100880",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "critical",
"timestamp": "2026-01-01T14:40:00Z",
"trace_id": "5a06e318-85c7-2e1e-63e0-d1177099a9e9"
} | {
"account_age_days": 1312,
"account_id": "ACCT-EB7CEFEA1167",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_2",
"session_entropy": 0.517
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 369,
"timestamp": "2026-01-01T14:40:00Z",
"transaction_amount_usd": 83328.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.481,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 487015.85,
"financial_exposure_usd": 936458.9,
"recoverable_pct": 0.253
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106359",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-05T09:59:00Z",
"trace_id": "aa5570aa-eacf-b067-49af-b89646be4b9f"
} | {
"account_age_days": 301,
"account_id": "ACCT-379331396884",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_2",
"session_entropy": 0.408
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 382,
"timestamp": "2026-01-05T05:44:00Z",
"transaction_amount_usd": 18.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.753,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1907998.96,
"financial_exposure_usd": 4424091.43,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107553",
"label": "benign",
"label_confidence": 0.629,
"severity": "high",
"timestamp": "2026-01-06T05:53:00Z",
"trace_id": "f7122325-8a88-b68b-462e-4307ff05e2dc"
} | {
"account_age_days": 1100,
"account_id": "ACCT-E04CC7006285",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.413
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 326,
"timestamp": "2026-01-06T00:05:00Z",
"transaction_amount_usd": 11.69
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.668,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3663.19,
"financial_exposure_usd": 4372.26,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102931",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "critical",
"timestamp": "2026-01-03T00:51:00Z",
"trace_id": "c4c7fd53-b486-b8ee-8cbc-dbfe88f1e967"
} | {
"account_age_days": 675,
"account_id": "ACCT-ACB1725687B9",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_2",
"session_entropy": 0.297
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 212,
"timestamp": "2026-01-03T00:51:00Z",
"transaction_amount_usd": 31796.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.714,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 563956.27,
"financial_exposure_usd": 958941.5,
"recoverable_pct": 0.151
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100229",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "low",
"timestamp": "2026-01-01T03:49:00Z",
"trace_id": "48a05e4f-b064-672a-394a-6d319b428238"
} | {
"account_age_days": 1351,
"account_id": "ACCT-D0013B992FC2",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.523
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 814,
"timestamp": "2026-01-01T03:49:00Z",
"transaction_amount_usd": 40969.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.62,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 390898.04,
"financial_exposure_usd": 461416.97,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101780",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "critical",
"timestamp": "2026-01-02T05:40:00Z",
"trace_id": "cb7d6cdb-139c-66c7-9b6a-faac5c8bc45d"
} | {
"account_age_days": 1154,
"account_id": "ACCT-0B7C68DF753B",
"baseline_risk_score": 0.574,
"kyc_tier": "tier_1",
"session_entropy": 0.416
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 229,
"timestamp": "2026-01-02T05:40:00Z",
"transaction_amount_usd": 65582.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.746,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 693655.6,
"financial_exposure_usd": 894494.06,
"recoverable_pct": 0.065
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103587",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "high",
"timestamp": "2026-01-03T11:47:00Z",
"trace_id": "a34d2e5f-17c4-0a33-b3ca-759f8534e5b6"
} | {
"account_age_days": 1245,
"account_id": "ACCT-A5CEC7A2AFBD",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.836
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 419,
"timestamp": "2026-01-03T11:47:00Z",
"transaction_amount_usd": 1494022.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.704,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 10493557.01,
"financial_exposure_usd": 10515528.44,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104112",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-03T20:32:00Z",
"trace_id": "53038658-d41f-0f8b-4830-2e1ebf2840ad"
} | {
"account_age_days": 1952,
"account_id": "ACCT-4A135E9A0891",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.526
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1177,
"timestamp": "2026-01-03T20:32:00Z",
"transaction_amount_usd": 1911051.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.83,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2641940.68,
"financial_exposure_usd": 5194315.34,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107669",
"label": "benign",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-06T07:49:00Z",
"trace_id": "f7bb30b3-ce56-785d-3460-19c61914c6d7"
} | {
"account_age_days": 1899,
"account_id": "ACCT-66084FE95F02",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.142
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 133,
"timestamp": "2026-01-06T02:38:00Z",
"transaction_amount_usd": 10.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 567.41,
"financial_exposure_usd": 1019.5,
"recoverable_pct": 0.552
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101751",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "medium",
"timestamp": "2026-01-02T05:11:00Z",
"trace_id": "4424e8f0-5b53-b43e-83a3-ab7e839d5496"
} | {
"account_age_days": 1853,
"account_id": "ACCT-2DECD8D7627D",
"baseline_risk_score": 0.588,
"kyc_tier": "tier_1",
"session_entropy": 0.705
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 347,
"timestamp": "2026-01-01T23:55:00Z",
"transaction_amount_usd": 11.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 602725.61,
"financial_exposure_usd": 741203.12,
"recoverable_pct": 0.199
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106485",
"label": "fraudulent",
"label_confidence": 0.717,
"severity": "high",
"timestamp": "2026-01-05T12:05:00Z",
"trace_id": "dc6a9045-fa52-81bc-f7e0-b26c3e75a6ba"
} | {
"account_age_days": 1691,
"account_id": "ACCT-CA686C2F0FBF",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_3",
"session_entropy": 0.707
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 979,
"timestamp": "2026-01-05T12:05:00Z",
"transaction_amount_usd": 1788522.06
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2193695.65,
"financial_exposure_usd": 3458729.38,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103555",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "low",
"timestamp": "2026-01-03T11:15:00Z",
"trace_id": "023085e0-d939-d36a-ba70-86edf948e36e"
} | {
"account_age_days": 692,
"account_id": "ACCT-02BC6119B2F0",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_3",
"session_entropy": 0.794
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 899,
"timestamp": "2026-01-03T11:15:00Z",
"transaction_amount_usd": 2746236.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3316447.42,
"financial_exposure_usd": 4727427.42,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101529",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "medium",
"timestamp": "2026-01-02T01:29:00Z",
"trace_id": "eaba777c-f670-c004-32d1-d9ee2dcf31d1"
} | {
"account_age_days": 1330,
"account_id": "ACCT-D6B99B65E43C",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_1",
"session_entropy": 0.382
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 718,
"timestamp": "2026-01-02T01:29:00Z",
"transaction_amount_usd": 107784.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 737950.96,
"financial_exposure_usd": 1020224.06,
"recoverable_pct": 0.253
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106595",
"label": "fraudulent",
"label_confidence": 0.661,
"severity": "low",
"timestamp": "2026-01-05T13:55:00Z",
"trace_id": "204ebe59-b520-8c39-400c-ec98ea288482"
} | {
"account_age_days": 1204,
"account_id": "ACCT-06DF3386FF6A",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_2",
"session_entropy": 0.377
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 300,
"timestamp": "2026-01-05T10:40:00Z",
"transaction_amount_usd": 5.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.602,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1891556.96,
"financial_exposure_usd": 3566018.87,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109876",
"label": "benign",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-07T20:36:00Z",
"trace_id": "80442ecd-021e-6fac-fa9d-b046bd49b29a"
} | {
"account_age_days": 80,
"account_id": "ACCT-EB928B338213",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_2",
"session_entropy": 0.586
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 380,
"timestamp": "2026-01-07T15:51:00Z",
"transaction_amount_usd": 5.41
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4347.1,
"financial_exposure_usd": 5413.65,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105089",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-04T12:49:00Z",
"trace_id": "ef361935-9830-66b6-b1df-6b3bb67d0fdf"
} | {
"account_age_days": 1937,
"account_id": "ACCT-5A4EF813D2EF",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.698
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 139,
"timestamp": "2026-01-04T12:49:00Z",
"transaction_amount_usd": 1289235.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.473,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3442064.1,
"financial_exposure_usd": 3494878.46,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104740",
"label": "fraudulent",
"label_confidence": 0.616,
"severity": "critical",
"timestamp": "2026-01-04T07:00:00Z",
"trace_id": "c4e7a9f7-0f33-5e73-1581-55f65420c449"
} | {
"account_age_days": 18,
"account_id": "ACCT-FF77FC1932AD",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_1",
"session_entropy": 0.277
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 792,
"timestamp": "2026-01-04T07:00:00Z",
"transaction_amount_usd": 2282315.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.519,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4800003.68,
"financial_exposure_usd": 6894901.24,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108159",
"label": "benign",
"label_confidence": 0.665,
"severity": "low",
"timestamp": "2026-01-06T15:59:00Z",
"trace_id": "471affd9-ecbe-2a73-6274-eba2dd9322f5"
} | {
"account_age_days": 1668,
"account_id": "ACCT-737A8F4FEF76",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.749
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 285,
"timestamp": "2026-01-06T15:59:00Z",
"transaction_amount_usd": 10675.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 676.47,
"financial_exposure_usd": 910.49,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107991",
"label": "benign",
"label_confidence": 0.568,
"severity": "high",
"timestamp": "2026-01-06T13:11:00Z",
"trace_id": "bcacba54-e039-05a3-b5a4-5e8a2947a407"
} | {
"account_age_days": 1004,
"account_id": "ACCT-2BF7E77E6788",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.526
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 106,
"timestamp": "2026-01-06T11:16:00Z",
"transaction_amount_usd": 18.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1256.04,
"financial_exposure_usd": 1929.74,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101021",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-01T17:01:00Z",
"trace_id": "cc075825-69b0-353f-eca3-9912408aac29"
} | {
"account_age_days": 1010,
"account_id": "ACCT-F82CCD42A9EF",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.628
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1047,
"timestamp": "2026-01-01T17:01:00Z",
"transaction_amount_usd": 18095.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.724,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 733255.31,
"financial_exposure_usd": 886161.53,
"recoverable_pct": 0.146
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103390",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-03T08:30:00Z",
"trace_id": "d8aaea9b-ffb4-be8e-8cfb-37e4a106991f"
} | {
"account_age_days": 366,
"account_id": "ACCT-0F9253D54F99",
"baseline_risk_score": 0.231,
"kyc_tier": "tier_3",
"session_entropy": 0.398
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 920,
"timestamp": "2026-01-03T08:30:00Z",
"transaction_amount_usd": 2699393.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.609,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2445081.44,
"financial_exposure_usd": 2637160.22,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106983",
"label": "benign",
"label_confidence": 0.623,
"severity": "critical",
"timestamp": "2026-01-05T20:23:00Z",
"trace_id": "4e9aef80-2be0-5d1b-7d9c-540ec34520d1"
} | {
"account_age_days": 846,
"account_id": "ACCT-3C853FE079FC",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_3",
"session_entropy": 0.253
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 505,
"timestamp": "2026-01-05T20:23:00Z",
"transaction_amount_usd": 7168.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4610.45,
"financial_exposure_usd": 4976.07,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107279",
"label": "benign",
"label_confidence": 0.488,
"severity": "low",
"timestamp": "2026-01-06T01:19:00Z",
"trace_id": "16da6afc-2593-c7c9-7f1b-68a4ee634199"
} | {
"account_age_days": 69,
"account_id": "ACCT-397919899E93",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.602
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1068,
"timestamp": "2026-01-06T01:19:00Z",
"transaction_amount_usd": 8281.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2631.86,
"financial_exposure_usd": 5210.67,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105071",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-04T12:31:00Z",
"trace_id": "bde80ff5-4a4d-3fd2-26a1-a4af4cee241f"
} | {
"account_age_days": 372,
"account_id": "ACCT-E09630BD2908",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_3",
"session_entropy": 0.264
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1081,
"timestamp": "2026-01-04T12:31:00Z",
"transaction_amount_usd": 2235874.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.477,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3574927.09,
"financial_exposure_usd": 6607030.24,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103394",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-03T08:34:00Z",
"trace_id": "06e91886-99cc-0957-4f5b-3f40f3062380"
} | {
"account_age_days": 1701,
"account_id": "ACCT-AC273F2EBBF6",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_2",
"session_entropy": 0.125
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 256,
"timestamp": "2026-01-03T06:07:00Z",
"transaction_amount_usd": 18.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 592651.87,
"financial_exposure_usd": 904589.92,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100638",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "high",
"timestamp": "2026-01-01T10:38:00Z",
"trace_id": "ec5464a1-8773-ae8a-7013-d7625d4a2b4a"
} | {
"account_age_days": 3,
"account_id": "ACCT-E57E0377AD61",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_2",
"session_entropy": 0.322
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 378,
"timestamp": "2026-01-01T08:00:00Z",
"transaction_amount_usd": 7.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.475,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 684185.95,
"financial_exposure_usd": 1138822.51,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101271",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "low",
"timestamp": "2026-01-01T21:11:00Z",
"trace_id": "1ab228d8-09d9-6e9f-7a88-bb550383c50d"
} | {
"account_age_days": 883,
"account_id": "ACCT-6C7F31AC1126",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_2",
"session_entropy": 0.61
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 252,
"timestamp": "2026-01-01T21:11:00Z",
"transaction_amount_usd": 953.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.669,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 531209.79,
"financial_exposure_usd": 534762.77,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104285",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "low",
"timestamp": "2026-01-03T23:25:00Z",
"trace_id": "d68976ec-40c1-1849-7a77-fef956e77870"
} | {
"account_age_days": 1867,
"account_id": "ACCT-D1720ECB76CD",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 741,
"timestamp": "2026-01-03T23:25:00Z",
"transaction_amount_usd": 167287.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.902,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3103704.23,
"financial_exposure_usd": 4160247.67,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105439",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "medium",
"timestamp": "2026-01-04T18:39:00Z",
"trace_id": "7e0dc9be-05d7-8282-8d0a-cd729a175b68"
} | {
"account_age_days": 1250,
"account_id": "ACCT-D39BD4641368",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_3",
"session_entropy": 0.214
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 81,
"timestamp": "2026-01-04T18:39:00Z",
"transaction_amount_usd": 641364.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.812,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2463802.75,
"financial_exposure_usd": 3245131.08,
"recoverable_pct": 0.417
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108266",
"label": "benign",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-06T17:46:00Z",
"trace_id": "f136f615-33e2-7e0d-966e-b90b014a291d"
} | {
"account_age_days": 778,
"account_id": "ACCT-788EF9D727B2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.491
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 272,
"timestamp": "2026-01-06T09:46:00Z",
"transaction_amount_usd": 7.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.469,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3820.83,
"financial_exposure_usd": 7300.9,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101223",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "high",
"timestamp": "2026-01-01T20:23:00Z",
"trace_id": "2ad8c43f-72bb-5039-77b8-c308432b9e6c"
} | {
"account_age_days": 125,
"account_id": "ACCT-E7367BFEFED9",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.302
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 154,
"timestamp": "2026-01-01T07:52:00Z",
"transaction_amount_usd": 20.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.417,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 218389.98,
"financial_exposure_usd": 322963.23,
"recoverable_pct": 0.192
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107106",
"label": "benign",
"label_confidence": 0.628,
"severity": "low",
"timestamp": "2026-01-05T22:26:00Z",
"trace_id": "0ba44c7f-7e0c-d8b0-a607-fe72b50d7355"
} | {
"account_age_days": 489,
"account_id": "ACCT-BC14D0AB6BB0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.414
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 314,
"timestamp": "2026-01-05T14:17:00Z",
"transaction_amount_usd": 0.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1716.56,
"financial_exposure_usd": 2521.22,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106681",
"label": "benign",
"label_confidence": 0.589,
"severity": "medium",
"timestamp": "2026-01-05T15:21:00Z",
"trace_id": "70283e02-3fe5-337b-8ecc-c3b739671622"
} | {
"account_age_days": 1566,
"account_id": "ACCT-EB4C060EF313",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.343
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 331,
"timestamp": "2026-01-05T11:11:00Z",
"transaction_amount_usd": 16.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.767,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3241.93,
"financial_exposure_usd": 3897.86,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108780",
"label": "benign",
"label_confidence": 0.59,
"severity": "medium",
"timestamp": "2026-01-07T02:20:00Z",
"trace_id": "a02905aa-75b7-5ca4-762f-e0ed04ac9343"
} | {
"account_age_days": 1728,
"account_id": "ACCT-399459FE065C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.713
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 686,
"timestamp": "2026-01-07T02:20:00Z",
"transaction_amount_usd": 419.49
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1285.03,
"financial_exposure_usd": 1456.16,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108764",
"label": "benign",
"label_confidence": 0.489,
"severity": "critical",
"timestamp": "2026-01-07T02:04:00Z",
"trace_id": "57dcdfc6-9e94-d212-05dd-a2b5ff8351f4"
} | {
"account_age_days": 208,
"account_id": "ACCT-4488A3B45199",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_3",
"session_entropy": 0.348
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 229,
"timestamp": "2026-01-07T02:04:00Z",
"transaction_amount_usd": 4059.72
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.52,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1018.6,
"financial_exposure_usd": 1253.47,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102244",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "low",
"timestamp": "2026-01-02T13:24:00Z",
"trace_id": "58407933-1660-8380-5169-7823169ead19"
} | {
"account_age_days": 374,
"account_id": "ACCT-23C48DD57C56",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_1",
"session_entropy": 0.136
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 365,
"timestamp": "2026-01-02T01:11:00Z",
"transaction_amount_usd": 7.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.754,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 453638.91,
"financial_exposure_usd": 993274.04,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103344",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-03T07:44:00Z",
"trace_id": "fddb53a3-76b4-1da9-4690-45ae15390905"
} | {
"account_age_days": 836,
"account_id": "ACCT-637BB039C38E",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 475,
"timestamp": "2026-01-03T07:44:00Z",
"transaction_amount_usd": 1424253.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.897,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4356713.61,
"financial_exposure_usd": 5897956.43,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107314",
"label": "benign",
"label_confidence": 0.507,
"severity": "high",
"timestamp": "2026-01-06T01:54:00Z",
"trace_id": "766dc108-87f2-1f0c-7c67-c54bd626d4a7"
} | {
"account_age_days": 1517,
"account_id": "ACCT-8841FEFAE602",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.654
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 100,
"timestamp": "2026-01-05T21:09:00Z",
"transaction_amount_usd": 10.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100589",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "high",
"timestamp": "2026-01-01T09:49:00Z",
"trace_id": "e02bc406-55b1-29a5-c744-5bfb8f6d27e1"
} | {
"account_age_days": 1886,
"account_id": "ACCT-CC05B7AE1D6A",
"baseline_risk_score": 0.546,
"kyc_tier": "tier_3",
"session_entropy": 0.825
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 293,
"timestamp": "2026-01-01T02:26:00Z",
"transaction_amount_usd": 6.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.764,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 434272.94,
"financial_exposure_usd": 673584.55,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103714",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-03T13:54:00Z",
"trace_id": "bf3cd046-23e2-af44-e91d-131dc96fd9fc"
} | {
"account_age_days": 174,
"account_id": "ACCT-E5E0B6259C7F",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_2",
"session_entropy": 0.119
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1177,
"timestamp": "2026-01-03T13:54:00Z",
"transaction_amount_usd": 2720183.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.717,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3213178.43,
"financial_exposure_usd": 4673613.9,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103312",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "medium",
"timestamp": "2026-01-03T07:12:00Z",
"trace_id": "28883b84-eb4f-4058-9d4b-dbfa6c871b46"
} | {
"account_age_days": 1590,
"account_id": "ACCT-DAD823FD76FB",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 610,
"timestamp": "2026-01-03T07:12:00Z",
"transaction_amount_usd": 17668.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 235878.99,
"financial_exposure_usd": 531137.48,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103454",
"label": "fraudulent",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-03T09:34:00Z",
"trace_id": "f7ca2f63-97db-15f3-7827-0c62b44e74c2"
} | {
"account_age_days": 863,
"account_id": "ACCT-ACDA7E13C0E4",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_3",
"session_entropy": 0.854
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 617,
"timestamp": "2026-01-03T09:34:00Z",
"transaction_amount_usd": 1740907.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 838626.01,
"financial_exposure_usd": 1317678.29,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105010",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "high",
"timestamp": "2026-01-04T11:30:00Z",
"trace_id": "5b196508-a004-d965-1761-33f9c6bae58c"
} | {
"account_age_days": 1314,
"account_id": "ACCT-EEAD1C169EB1",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.79
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1156,
"timestamp": "2026-01-04T11:30:00Z",
"transaction_amount_usd": 1375835.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.616,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5388590.38,
"financial_exposure_usd": 6356364.83,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106238",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "high",
"timestamp": "2026-01-05T07:58:00Z",
"trace_id": "eba3bc0f-ad6c-5f34-faed-6c144da3025e"
} | {
"account_age_days": 432,
"account_id": "ACCT-B4282E1D53AD",
"baseline_risk_score": 0.237,
"kyc_tier": "tier_3",
"session_entropy": 0.493
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 979,
"timestamp": "2026-01-05T07:58:00Z",
"transaction_amount_usd": 2649008.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.378,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4210191.64,
"financial_exposure_usd": 8287002.25,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106467",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "high",
"timestamp": "2026-01-05T11:47:00Z",
"trace_id": "4a88e41e-5d75-b930-5020-5a38628ae502"
} | {
"account_age_days": 259,
"account_id": "ACCT-FD8A58B8F6A6",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_2",
"session_entropy": 0.886
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 174,
"timestamp": "2026-01-05T03:42:00Z",
"transaction_amount_usd": 1.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.38,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 539145.93,
"financial_exposure_usd": 830514.83,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104371",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-04T00:51:00Z",
"trace_id": "bffcd972-b121-5a5a-afab-7f6177be2e08"
} | {
"account_age_days": 1563,
"account_id": "ACCT-27B51568E71D",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 554,
"timestamp": "2026-01-04T00:51:00Z",
"transaction_amount_usd": 1485336.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.672,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3885587.7,
"financial_exposure_usd": 3931641,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103191",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-03T05:11:00Z",
"trace_id": "827d8b90-70fb-cd3b-35ae-37d8ba0352ad"
} | {
"account_age_days": 1492,
"account_id": "ACCT-C77706FAEAFD",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1012,
"timestamp": "2026-01-03T05:11:00Z",
"transaction_amount_usd": 108526.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 777567.76,
"financial_exposure_usd": 1126638.15,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103133",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "high",
"timestamp": "2026-01-03T04:13:00Z",
"trace_id": "e095b72f-d16b-b3d9-1114-6a52d4665694"
} | {
"account_age_days": 1050,
"account_id": "ACCT-832E3E1CD576",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_3",
"session_entropy": 0.454
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 210,
"timestamp": "2026-01-03T04:13:00Z",
"transaction_amount_usd": 52309.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 430853.99,
"financial_exposure_usd": 556372.38,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104940",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "high",
"timestamp": "2026-01-04T10:20:00Z",
"trace_id": "e8bc1bab-ffaf-119f-1bc7-8d76d658eb17"
} | {
"account_age_days": 816,
"account_id": "ACCT-CAD64BA9C8CC",
"baseline_risk_score": 0.351,
"kyc_tier": "tier_2",
"session_entropy": 0.686
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 291,
"timestamp": "2026-01-04T05:22:00Z",
"transaction_amount_usd": 23.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.941,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6178913.19,
"financial_exposure_usd": 7193872.94,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108918",
"label": "benign",
"label_confidence": 0.471,
"severity": "high",
"timestamp": "2026-01-07T04:38:00Z",
"trace_id": "f70b3187-520b-f5e5-1d8f-8ca1a674591a"
} | {
"account_age_days": 106,
"account_id": "ACCT-465B32DD364E",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 131,
"timestamp": "2026-01-06T22:14:00Z",
"transaction_amount_usd": 8.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 968.92,
"financial_exposure_usd": 1358.04,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108093",
"label": "benign",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-06T14:53:00Z",
"trace_id": "53d86f0d-636e-a2ad-fc5b-6f6f3220f419"
} | {
"account_age_days": 52,
"account_id": "ACCT-B76B27A3A312",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.805
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 191,
"timestamp": "2026-01-06T14:53:00Z",
"transaction_amount_usd": 4663.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.721,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1855.55,
"financial_exposure_usd": 2162.31,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109643",
"label": "benign",
"label_confidence": 0.63,
"severity": "medium",
"timestamp": "2026-01-07T16:43:00Z",
"trace_id": "e9e76bb6-27cb-d2e3-bf43-e2ee46a3c369"
} | {
"account_age_days": 720,
"account_id": "ACCT-E5C043029079",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.415
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 249,
"timestamp": "2026-01-07T16:43:00Z",
"transaction_amount_usd": 14588.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.568,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 608.4,
"financial_exposure_usd": 1213.64,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109706",
"label": "benign",
"label_confidence": 0.517,
"severity": "low",
"timestamp": "2026-01-07T17:46:00Z",
"trace_id": "cc550c82-ed01-a023-1676-b6ecec2ca4ea"
} | {
"account_age_days": 1693,
"account_id": "ACCT-08BA3C37FC9A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.15
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 934,
"timestamp": "2026-01-07T17:46:00Z",
"transaction_amount_usd": 2451.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1537.76,
"financial_exposure_usd": 2386.55,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101364",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-01T22:44:00Z",
"trace_id": "d95398d4-cbf0-5962-4e27-ffecec3a6591"
} | {
"account_age_days": 1206,
"account_id": "ACCT-6EBB4AC796D7",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_2",
"session_entropy": 0.49
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 321,
"timestamp": "2026-01-01T13:15:00Z",
"transaction_amount_usd": 4.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.747,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 408101.25,
"financial_exposure_usd": 607847.6,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102294",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-02T14:14:00Z",
"trace_id": "0159f709-3837-02fe-698c-6a1829675f73"
} | {
"account_age_days": 416,
"account_id": "ACCT-7712697B379D",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_1",
"session_entropy": 0.487
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 1075,
"timestamp": "2026-01-02T14:14:00Z",
"transaction_amount_usd": 28576.06
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.407,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 180659.65,
"financial_exposure_usd": 198715.47,
"recoverable_pct": 0.287
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103746",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "high",
"timestamp": "2026-01-03T14:26:00Z",
"trace_id": "035eb19e-185d-4345-e9ef-31773d9b8e09"
} | {
"account_age_days": 413,
"account_id": "ACCT-7F05E28B29ED",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_2",
"session_entropy": 0.333
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 197,
"timestamp": "2026-01-03T14:26:00Z",
"transaction_amount_usd": 2629408.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.514,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1071897.34,
"financial_exposure_usd": 1749676.95,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109562",
"label": "benign",
"label_confidence": 0.651,
"severity": "medium",
"timestamp": "2026-01-07T15:22:00Z",
"trace_id": "aa683bf0-3200-60dd-d506-a82b40dc8af9"
} | {
"account_age_days": 1397,
"account_id": "ACCT-12DE21365D3F",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 785,
"timestamp": "2026-01-07T15:22:00Z",
"transaction_amount_usd": 8616.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.493,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2610.86,
"financial_exposure_usd": 3425.65,
"recoverable_pct": 0.631
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109843",
"label": "benign",
"label_confidence": 0.527,
"severity": "low",
"timestamp": "2026-01-07T20:03:00Z",
"trace_id": "ebaba499-3178-4baf-83df-e25f762dc588"
} | {
"account_age_days": 972,
"account_id": "ACCT-F671C3179D79",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_2",
"session_entropy": 0.325
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 369,
"timestamp": "2026-01-07T09:03:00Z",
"transaction_amount_usd": 18.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.758,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1569.35,
"financial_exposure_usd": 2114.43,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105155",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "critical",
"timestamp": "2026-01-04T13:55:00Z",
"trace_id": "ae02a458-a039-bdf4-01a9-a71099d3f6b8"
} | {
"account_age_days": 1082,
"account_id": "ACCT-8220B2B47079",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_3",
"session_entropy": 0.643
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 138,
"timestamp": "2026-01-04T13:55:00Z",
"transaction_amount_usd": 1970085.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.633,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5160558.99,
"financial_exposure_usd": 7054938.39,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102866",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "high",
"timestamp": "2026-01-02T23:46:00Z",
"trace_id": "fee9a24c-1a2a-1a1b-a24e-d661472bf119"
} | {
"account_age_days": 209,
"account_id": "ACCT-8891B3188EC8",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_3",
"session_entropy": 0.612
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 853,
"timestamp": "2026-01-02T23:46:00Z",
"transaction_amount_usd": 28804.5
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.631,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 475126.25,
"financial_exposure_usd": 496534.97,
"recoverable_pct": 0.068
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105156",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "high",
"timestamp": "2026-01-04T13:56:00Z",
"trace_id": "e98681b7-fcca-99c9-122e-ee9516af86ff"
} | {
"account_age_days": 773,
"account_id": "ACCT-1359E87BB29B",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_1",
"session_entropy": 0.72
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1001,
"timestamp": "2026-01-04T13:56:00Z",
"transaction_amount_usd": 1136543.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.859,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 717222.18,
"financial_exposure_usd": 1527944.38,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104682",
"label": "fraudulent",
"label_confidence": 0.608,
"severity": "high",
"timestamp": "2026-01-04T06:02:00Z",
"trace_id": "d916fff6-bbee-97a2-d01d-5ef64578d6e3"
} | {
"account_age_days": 1431,
"account_id": "ACCT-55025EE770AB",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_3",
"session_entropy": 0.444
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1011,
"timestamp": "2026-01-04T06:02:00Z",
"transaction_amount_usd": 1073070.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.484,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1629351.95,
"financial_exposure_usd": 2308252.8,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105772",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "low",
"timestamp": "2026-01-05T00:12:00Z",
"trace_id": "9debd984-1be7-f085-6d65-869730993874"
} | {
"account_age_days": 1037,
"account_id": "ACCT-AA9EA17D3599",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_1",
"session_entropy": 0.626
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 328,
"timestamp": "2026-01-04T21:36:00Z",
"transaction_amount_usd": 12.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4815785.02,
"financial_exposure_usd": 6059425.08,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101717",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-02T04:37:00Z",
"trace_id": "1c274e43-53a3-ea46-8054-aa86d689746f"
} | {
"account_age_days": 171,
"account_id": "ACCT-A55DB062336D",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.564
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 238,
"timestamp": "2026-01-01T23:53:00Z",
"transaction_amount_usd": 14.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 614805.98,
"financial_exposure_usd": 703436.85,
"recoverable_pct": 0.395
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109050",
"label": "benign",
"label_confidence": 0.745,
"severity": "low",
"timestamp": "2026-01-07T06:50:00Z",
"trace_id": "21abb98c-ea61-b004-ba8b-dbfe075bf229"
} | {
"account_age_days": 555,
"account_id": "ACCT-ADB83199BE20",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.864
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 859,
"timestamp": "2026-01-07T06:50:00Z",
"transaction_amount_usd": 6164.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2359.04,
"financial_exposure_usd": 5568.02,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102338",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-02T14:58:00Z",
"trace_id": "7c518962-68d4-4f5e-c8cc-5c4eb1f384a1"
} | {
"account_age_days": 665,
"account_id": "ACCT-CF6419064B6C",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_1",
"session_entropy": 0.217
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 281,
"timestamp": "2026-01-02T02:43:00Z",
"transaction_amount_usd": 23.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.776,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 446347.27,
"financial_exposure_usd": 753555.86,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103365",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-03T08:05:00Z",
"trace_id": "ad66868b-a865-c641-2641-204daa5c18ab"
} | {
"account_age_days": 367,
"account_id": "ACCT-A8A49BDD3FCC",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_3",
"session_entropy": 0.735
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 105,
"timestamp": "2026-01-03T06:15:00Z",
"transaction_amount_usd": 8.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.6,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 2988990.24,
"financial_exposure_usd": 4051548.76,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107128",
"label": "benign",
"label_confidence": 0.552,
"severity": "high",
"timestamp": "2026-01-05T22:48:00Z",
"trace_id": "e2a2e8a5-a690-21dc-10e8-eac43fd9dcc6"
} | {
"account_age_days": 1880,
"account_id": "ACCT-DB16567440A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.471
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 363,
"timestamp": "2026-01-05T11:28:00Z",
"transaction_amount_usd": 14.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 657.75,
"financial_exposure_usd": 1365.66,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102234",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-02T13:14:00Z",
"trace_id": "6923f8ac-0bb9-5831-da7c-ed57b243a541"
} | {
"account_age_days": 39,
"account_id": "ACCT-CEAB0D5018FC",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_3",
"session_entropy": 0.573
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 419,
"timestamp": "2026-01-02T13:14:00Z",
"transaction_amount_usd": 105868.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.806,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 717468.4,
"financial_exposure_usd": 1270324.36,
"recoverable_pct": 0.268
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104180",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "medium",
"timestamp": "2026-01-03T21:40:00Z",
"trace_id": "dd95d4de-19f0-d947-68ec-c233cdf62204"
} | {
"account_age_days": 1656,
"account_id": "ACCT-85E57D00CA1E",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_3",
"session_entropy": 0.479
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 263,
"timestamp": "2026-01-03T21:40:00Z",
"transaction_amount_usd": 1174063.2
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.611,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2273073.25,
"financial_exposure_usd": 3720484.4,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100668",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-01T11:08:00Z",
"trace_id": "90d0bea1-d9bf-112f-07a7-79132d376d45"
} | {
"account_age_days": 1349,
"account_id": "ACCT-19BA06EE5682",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_1",
"session_entropy": 0.276
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 233,
"timestamp": "2026-01-01T11:08:00Z",
"transaction_amount_usd": 106574.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.705,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 407492.91,
"financial_exposure_usd": 780923.97,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108325",
"label": "benign",
"label_confidence": 0.723,
"severity": "high",
"timestamp": "2026-01-06T18:45:00Z",
"trace_id": "a16641c6-aa75-186c-aa28-3c868573079c"
} | {
"account_age_days": 317,
"account_id": "ACCT-57F1FF4B8441",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.92
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 872,
"timestamp": "2026-01-06T18:45:00Z",
"transaction_amount_usd": 14519.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1119.44,
"financial_exposure_usd": 1981.56,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104571",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "medium",
"timestamp": "2026-01-04T04:11:00Z",
"trace_id": "16592c5e-c2c1-8e56-7305-0dda32748a40"
} | {
"account_age_days": 877,
"account_id": "ACCT-AF42597083D0",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_3",
"session_entropy": 0.458
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 411,
"timestamp": "2026-01-04T04:11:00Z",
"transaction_amount_usd": 155760.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.463,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1908466.94,
"financial_exposure_usd": 1971172.68,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106660",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "low",
"timestamp": "2026-01-05T15:00:00Z",
"trace_id": "0f0b267d-a949-93f0-2c86-7fb060b5ff12"
} | {
"account_age_days": 1160,
"account_id": "ACCT-F4A21FB5D2A7",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_2",
"session_entropy": 0.603
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 86,
"timestamp": "2026-01-05T15:00:00Z",
"transaction_amount_usd": 2304413.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.559,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3331759.37,
"financial_exposure_usd": 4449485.13,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107092",
"label": "benign",
"label_confidence": 0.454,
"severity": "low",
"timestamp": "2026-01-05T22:12:00Z",
"trace_id": "bb7d8b47-c0ff-c2d2-68b7-a9b1ba9c6dec"
} | {
"account_age_days": 1874,
"account_id": "ACCT-33962087F600",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.888
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1145,
"timestamp": "2026-01-05T22:12:00Z",
"transaction_amount_usd": 13830.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1142.24,
"financial_exposure_usd": 2755.78,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106086",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "critical",
"timestamp": "2026-01-05T05:26:00Z",
"trace_id": "ff522efc-4ad2-2f78-1057-26af1ac766f7"
} | {
"account_age_days": 1579,
"account_id": "ACCT-A17C61209F93",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_2",
"session_entropy": 0.85
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 364,
"timestamp": "2026-01-05T05:26:00Z",
"transaction_amount_usd": 621730.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3590140.32,
"financial_exposure_usd": 5400307.74,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103429",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "critical",
"timestamp": "2026-01-03T09:09:00Z",
"trace_id": "cb77803e-d31b-1dd7-f155-7d8c0972a7f8"
} | {
"account_age_days": 1801,
"account_id": "ACCT-A956DFCC1556",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.651
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 757,
"timestamp": "2026-01-03T09:09:00Z",
"transaction_amount_usd": 2904819.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.879,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1304811.29,
"financial_exposure_usd": 2853391.44,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105302",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-04T16:22:00Z",
"trace_id": "48d56625-d91a-2a7a-035d-0779aae41696"
} | {
"account_age_days": 390,
"account_id": "ACCT-425DF63C03F1",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_3",
"session_entropy": 0.174
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 318,
"timestamp": "2026-01-04T16:22:00Z",
"transaction_amount_usd": 1696759.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.46,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3295241.13,
"financial_exposure_usd": 4425460.82,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106374",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "high",
"timestamp": "2026-01-05T10:14:00Z",
"trace_id": "cb525962-4131-9304-9133-27fff44266cd"
} | {
"account_age_days": 1671,
"account_id": "ACCT-782586AD46BC",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_2",
"session_entropy": 0.415
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 143,
"timestamp": "2026-01-05T02:35:00Z",
"transaction_amount_usd": 6.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.768,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3236540.9,
"financial_exposure_usd": 3835634.04,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108662",
"label": "benign",
"label_confidence": 0.667,
"severity": "low",
"timestamp": "2026-01-07T00:22:00Z",
"trace_id": "99725818-28a2-49de-5ce4-1cc98636cdbc"
} | {
"account_age_days": 1679,
"account_id": "ACCT-6266D7979620",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.311
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 407,
"timestamp": "2026-01-07T00:22:00Z",
"transaction_amount_usd": 2335.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.697,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 207.69,
"financial_exposure_usd": 394.65,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103315",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "critical",
"timestamp": "2026-01-03T07:15:00Z",
"trace_id": "87d4c22e-17aa-28d4-b835-aa108292fc9d"
} | {
"account_age_days": 1984,
"account_id": "ACCT-D3FC6CA48550",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_2",
"session_entropy": 0.935
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 638,
"timestamp": "2026-01-03T07:15:00Z",
"transaction_amount_usd": 69256.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.488,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1242895.59,
"financial_exposure_usd": 1249557.03,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106667",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "high",
"timestamp": "2026-01-05T15:07:00Z",
"trace_id": "cfb0c1b9-7240-7f87-135d-dc44fb51cfef"
} | {
"account_age_days": 11,
"account_id": "ACCT-7D27D809A701",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_1",
"session_entropy": 0.526
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 149,
"timestamp": "2026-01-05T08:40:00Z",
"transaction_amount_usd": 20.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.479,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1371801.77,
"financial_exposure_usd": 1684735.72,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104204",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "critical",
"timestamp": "2026-01-03T22:04:00Z",
"trace_id": "1d1820bc-602c-80ac-b418-4c39cb68aee9"
} | {
"account_age_days": 1054,
"account_id": "ACCT-7181B3DBC706",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_1",
"session_entropy": 0.254
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1046,
"timestamp": "2026-01-03T22:04:00Z",
"transaction_amount_usd": 266213.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4011971.53,
"financial_exposure_usd": 4771765.57,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104542",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-04T03:42:00Z",
"trace_id": "9c7fa72f-edc8-7c87-654e-5767ff25dae4"
} | {
"account_age_days": 383,
"account_id": "ACCT-BBBA3FEB100A",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_2",
"session_entropy": 0.387
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 555,
"timestamp": "2026-01-04T03:42:00Z",
"transaction_amount_usd": 2960805.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.753,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1845846.3,
"financial_exposure_usd": 2198596.36,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100661",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "critical",
"timestamp": "2026-01-01T11:01:00Z",
"trace_id": "aeaebeec-58dc-a3ae-c51d-e45f0f5b0f76"
} | {
"account_age_days": 135,
"account_id": "ACCT-3281FC750F08",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_3",
"session_entropy": 0.171
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 333,
"timestamp": "2026-01-01T01:10:00Z",
"transaction_amount_usd": 15.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.869,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 534167.91,
"financial_exposure_usd": 799181.22,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105032",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-04T11:52:00Z",
"trace_id": "a9053fcc-7c15-c484-6d39-49a80f02a941"
} | {
"account_age_days": 1672,
"account_id": "ACCT-D1B379ED631C",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_2",
"session_entropy": 0.563
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 243,
"timestamp": "2026-01-04T11:52:00Z",
"transaction_amount_usd": 2181495.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.598,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2352878.79,
"financial_exposure_usd": 4975786.3,
"recoverable_pct": 0.798
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102138",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "high",
"timestamp": "2026-01-02T11:38:00Z",
"trace_id": "c5abf054-7a7d-94af-3b68-30b8f91ad558"
} | {
"account_age_days": 1557,
"account_id": "ACCT-56D95F244A14",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.422
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 199,
"timestamp": "2026-01-02T06:38:00Z",
"transaction_amount_usd": 4.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.889,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 484071.31,
"financial_exposure_usd": 605566.42,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102941",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-03T01:01:00Z",
"trace_id": "8b9a4a5c-390d-3198-6cd0-fd8866fa396b"
} | {
"account_age_days": 1771,
"account_id": "ACCT-CDE1E1D24E5A",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_3",
"session_entropy": 0.55
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1124,
"timestamp": "2026-01-03T01:01:00Z",
"transaction_amount_usd": 43986.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.826,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 326263.98,
"financial_exposure_usd": 578125.57,
"recoverable_pct": 0.123
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107884",
"label": "benign",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-06T11:24:00Z",
"trace_id": "c95ca0bc-313c-7f40-5e7e-90c306a5823d"
} | {
"account_age_days": 998,
"account_id": "ACCT-4874463870ED",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.93
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 782,
"timestamp": "2026-01-06T11:24:00Z",
"transaction_amount_usd": 4420.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1616.48,
"financial_exposure_usd": 3830.84,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109110",
"label": "benign",
"label_confidence": 0.679,
"severity": "high",
"timestamp": "2026-01-07T07:50:00Z",
"trace_id": "cb3dad26-31df-f70c-1c61-5441ff2c69c4"
} | {
"account_age_days": 1266,
"account_id": "ACCT-71537A5D2478",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.142
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 141,
"timestamp": "2026-01-06T23:38:00Z",
"transaction_amount_usd": 15.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.53,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1314.12,
"financial_exposure_usd": 1829.68,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101348",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "low",
"timestamp": "2026-01-01T22:28:00Z",
"trace_id": "2a0a84b1-2421-32c9-cb49-9d1e99be5b59"
} | {
"account_age_days": 1072,
"account_id": "ACCT-19AB097DD93A",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_2",
"session_entropy": 0.521
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 527,
"timestamp": "2026-01-01T22:28:00Z",
"transaction_amount_usd": 43772.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.668,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 674908.09,
"financial_exposure_usd": 1038977.11,
"recoverable_pct": 0.177
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105443",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-04T18:43:00Z",
"trace_id": "cb9464ba-7e0e-a7d9-bc00-a3bdc18e9c47"
} | {
"account_age_days": 1892,
"account_id": "ACCT-894F33C34DD9",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.594
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 773,
"timestamp": "2026-01-04T18:43:00Z",
"transaction_amount_usd": 1758722.55
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.621,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2305559.66,
"financial_exposure_usd": 4819252.71,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102366",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "high",
"timestamp": "2026-01-02T15:26:00Z",
"trace_id": "570437cd-7d70-8f8e-ac04-a262c60ec399"
} | {
"account_age_days": 1640,
"account_id": "ACCT-978327DA8D3E",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_1",
"session_entropy": 0.686
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 824,
"timestamp": "2026-01-02T15:26:00Z",
"transaction_amount_usd": 114755.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 297403.25,
"financial_exposure_usd": 505335.17,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107941",
"label": "benign",
"label_confidence": 0.744,
"severity": "high",
"timestamp": "2026-01-06T12:21:00Z",
"trace_id": "cfd61afe-7877-7c24-4bda-302bf76720c5"
} | {
"account_age_days": 192,
"account_id": "ACCT-6430F551203E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.155
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 382,
"timestamp": "2026-01-06T05:40:00Z",
"transaction_amount_usd": 24.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.461,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2438.24,
"financial_exposure_usd": 3980.14,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101492",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-02T00:52:00Z",
"trace_id": "7d5a42af-6744-5187-0e54-560cef1ba0c1"
} | {
"account_age_days": 71,
"account_id": "ACCT-6BE677D37D40",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_3",
"session_entropy": 0.476
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 373,
"timestamp": "2026-01-01T13:39:00Z",
"transaction_amount_usd": 9.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.4,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 246553.61,
"financial_exposure_usd": 607264.26,
"recoverable_pct": 0.076
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105159",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-04T13:59:00Z",
"trace_id": "22e3f8c4-1f6d-de80-2e5b-723a3425a1b7"
} | {
"account_age_days": 11,
"account_id": "ACCT-F164136F4169",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_1",
"session_entropy": 0.131
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 506,
"timestamp": "2026-01-04T13:59:00Z",
"transaction_amount_usd": 1540564.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.948,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2852462.86,
"financial_exposure_usd": 6100322,
"recoverable_pct": 0.884
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102654",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-02T20:14:00Z",
"trace_id": "6ca7970e-c366-f252-b057-740e5792ddc3"
} | {
"account_age_days": 247,
"account_id": "ACCT-36DFDA6D2DF3",
"baseline_risk_score": 0.547,
"kyc_tier": "tier_1",
"session_entropy": 0.853
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 274,
"timestamp": "2026-01-02T20:14:00Z",
"transaction_amount_usd": 24266.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.631,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 322954.11,
"financial_exposure_usd": 492573.82,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.