schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102380",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "high",
"timestamp": "2026-01-02T15:40:00Z",
"trace_id": "ba1468df-ab9e-f9bb-0f73-a7ca65b989c1"
} | {
"account_age_days": 335,
"account_id": "ACCT-282349E722D6",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_1",
"session_entropy": 0.911
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 384,
"timestamp": "2026-01-02T08:41:00Z",
"transaction_amount_usd": 16.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.696,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 444864.93,
"financial_exposure_usd": 754710.81,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102139",
"label": "fraudulent",
"label_confidence": 0.938,
"severity": "high",
"timestamp": "2026-01-02T11:39:00Z",
"trace_id": "05c1b6fe-661f-2c7c-820c-712df9aa0b77"
} | {
"account_age_days": 1120,
"account_id": "ACCT-6200F62EF0A9",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_2",
"session_entropy": 0.214
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 195,
"timestamp": "2026-01-02T11:39:00Z",
"transaction_amount_usd": 88805.73
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.664,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 661455.59,
"financial_exposure_usd": 692563.02,
"recoverable_pct": 0.338
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104071",
"label": "fraudulent",
"label_confidence": 0.677,
"severity": "high",
"timestamp": "2026-01-03T19:51:00Z",
"trace_id": "33ebd205-6a75-d6d2-bdde-465dc7735d61"
} | {
"account_age_days": 1633,
"account_id": "ACCT-32CD7924F6A4",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_1",
"session_entropy": 0.172
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 229,
"timestamp": "2026-01-03T13:31:00Z",
"transaction_amount_usd": 7.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.932,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4918692.36,
"financial_exposure_usd": 6343434.22,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103511",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "medium",
"timestamp": "2026-01-03T10:31:00Z",
"trace_id": "15ee6cca-9631-3bc6-956e-f4398fed7c09"
} | {
"account_age_days": 1999,
"account_id": "ACCT-431C5F09D36C",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_2",
"session_entropy": 0.243
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 542,
"timestamp": "2026-01-03T10:31:00Z",
"transaction_amount_usd": 177759.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3127688.52,
"financial_exposure_usd": 4656672.8,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102052",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "critical",
"timestamp": "2026-01-02T10:12:00Z",
"trace_id": "d5bfeadb-fa1e-f202-8cc8-f4c25cd0330a"
} | {
"account_age_days": 1146,
"account_id": "ACCT-E0ED4D416792",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.32
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 320,
"timestamp": "2026-01-02T02:27:00Z",
"transaction_amount_usd": 17.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.353,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 628441.75,
"financial_exposure_usd": 988042.45,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106352",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-05T09:52:00Z",
"trace_id": "ef8b56f0-65be-7f32-d294-791a7cef60e1"
} | {
"account_age_days": 1985,
"account_id": "ACCT-69376C71DD87",
"baseline_risk_score": 0.206,
"kyc_tier": "tier_2",
"session_entropy": 0.433
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 127,
"timestamp": "2026-01-05T09:52:00Z",
"transaction_amount_usd": 2533125.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.473,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2181166.59,
"financial_exposure_usd": 3877252.22,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103496",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "low",
"timestamp": "2026-01-03T10:16:00Z",
"trace_id": "4e4ae7ee-dc2a-870f-98a6-e5a8873495b4"
} | {
"account_age_days": 722,
"account_id": "ACCT-10BC4E8280DF",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_2",
"session_entropy": 0.107
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 643,
"timestamp": "2026-01-03T10:16:00Z",
"transaction_amount_usd": 1501396.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.872,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1837236.43,
"financial_exposure_usd": 3169751.02,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101723",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-02T04:43:00Z",
"trace_id": "f970bead-9725-0ec9-9e6d-d816ec4c9036"
} | {
"account_age_days": 584,
"account_id": "ACCT-8C9D812BC716",
"baseline_risk_score": 0.481,
"kyc_tier": "tier_2",
"session_entropy": 0.785
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 492,
"timestamp": "2026-01-02T04:43:00Z",
"transaction_amount_usd": 44816.86
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 352266.26,
"financial_exposure_usd": 575061.45,
"recoverable_pct": 0.154
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100611",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "medium",
"timestamp": "2026-01-01T10:11:00Z",
"trace_id": "6d996b2b-1e6f-1679-abce-530485e320ae"
} | {
"account_age_days": 455,
"account_id": "ACCT-09D35E757C09",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_1",
"session_entropy": 0.545
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 262,
"timestamp": "2026-01-01T10:11:00Z",
"transaction_amount_usd": 10775.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.389,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 624704.58,
"financial_exposure_usd": 677034.78,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104809",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "low",
"timestamp": "2026-01-04T08:09:00Z",
"trace_id": "b2ad2b67-9a0a-926c-b8cf-b9e4c12f8305"
} | {
"account_age_days": 1562,
"account_id": "ACCT-73CF6CCB7E23",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_1",
"session_entropy": 0.444
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 958,
"timestamp": "2026-01-04T08:09:00Z",
"transaction_amount_usd": 299979.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.805,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5570602.04,
"financial_exposure_usd": 6803889.7,
"recoverable_pct": 0.854
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109176",
"label": "benign",
"label_confidence": 0.576,
"severity": "medium",
"timestamp": "2026-01-07T08:56:00Z",
"trace_id": "855b05a9-8c92-8cf5-46f4-949c7c7afb24"
} | {
"account_age_days": 273,
"account_id": "ACCT-B47423F8846F",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.812
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 673,
"timestamp": "2026-01-07T08:56:00Z",
"transaction_amount_usd": 11767.95
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1673.74,
"financial_exposure_usd": 3336.47,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109218",
"label": "benign",
"label_confidence": 0.715,
"severity": "low",
"timestamp": "2026-01-07T09:38:00Z",
"trace_id": "b7a8267a-38e9-03bb-96b7-2505d1ef93e1"
} | {
"account_age_days": 604,
"account_id": "ACCT-C6977315B581",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.461
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1117,
"timestamp": "2026-01-07T09:38:00Z",
"transaction_amount_usd": 11375.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2596.16,
"financial_exposure_usd": 2718.84,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101036",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "medium",
"timestamp": "2026-01-01T17:16:00Z",
"trace_id": "12b071bb-b894-8faf-f111-a610e7821d04"
} | {
"account_age_days": 1202,
"account_id": "ACCT-2CF41D1A8DF9",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_3",
"session_entropy": 0.162
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 98,
"timestamp": "2026-01-01T13:59:00Z",
"transaction_amount_usd": 2.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 856253.61,
"financial_exposure_usd": 1033524.04,
"recoverable_pct": 0.047
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103831",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "low",
"timestamp": "2026-01-03T15:51:00Z",
"trace_id": "c51e37e1-2ecd-f56e-a995-866f926b7271"
} | {
"account_age_days": 718,
"account_id": "ACCT-CDD8D53A97E9",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_1",
"session_entropy": 0.691
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 257,
"timestamp": "2026-01-03T10:20:00Z",
"transaction_amount_usd": 1.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.442,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5955025.49,
"financial_exposure_usd": 6355515.17,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100523",
"label": "fraudulent",
"label_confidence": 0.96,
"severity": "medium",
"timestamp": "2026-01-01T08:43:00Z",
"trace_id": "9f58ff84-f025-0b18-e4c6-460b9c7ddedf"
} | {
"account_age_days": 1709,
"account_id": "ACCT-9FCD0BD6CD2B",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_2",
"session_entropy": 0.887
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 269,
"timestamp": "2025-12-31T21:25:00Z",
"transaction_amount_usd": 15.69
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 620336.23,
"financial_exposure_usd": 953963.72,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103494",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "medium",
"timestamp": "2026-01-03T10:14:00Z",
"trace_id": "8c55d4a6-023b-e27f-48b2-af646dcd03aa"
} | {
"account_age_days": 1107,
"account_id": "ACCT-25A8FAECC375",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_2",
"session_entropy": 0.719
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 292,
"timestamp": "2026-01-03T10:14:00Z",
"transaction_amount_usd": 2813672.49
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.538,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3680148.24,
"financial_exposure_usd": 3785643.54,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108377",
"label": "benign",
"label_confidence": 0.677,
"severity": "medium",
"timestamp": "2026-01-06T19:37:00Z",
"trace_id": "e6f9a194-b5d1-50f3-6427-17bfa3087cfd"
} | {
"account_age_days": 90,
"account_id": "ACCT-2B31D44F757F",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.118
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 246,
"timestamp": "2026-01-06T19:37:00Z",
"transaction_amount_usd": 1936.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1670.1,
"financial_exposure_usd": 2121.37,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101530",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-02T01:30:00Z",
"trace_id": "720c3c4f-4e37-53d3-ee01-9ccce7917731"
} | {
"account_age_days": 1342,
"account_id": "ACCT-A3B3963A36DA",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_1",
"session_entropy": 0.638
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 925,
"timestamp": "2026-01-02T01:30:00Z",
"transaction_amount_usd": 117664.56
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.484,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 387598.41,
"financial_exposure_usd": 563139.39,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104732",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "low",
"timestamp": "2026-01-04T06:52:00Z",
"trace_id": "dbf77f98-3a19-4530-3be0-5e97bf1aeb19"
} | {
"account_age_days": 356,
"account_id": "ACCT-40189829ED03",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_3",
"session_entropy": 0.788
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 689,
"timestamp": "2026-01-04T06:52:00Z",
"transaction_amount_usd": 2761502.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2465146.84,
"financial_exposure_usd": 4075222.26,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103577",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-03T11:37:00Z",
"trace_id": "46de0da6-4b8b-5fbd-4d3d-f3166dd3ed07"
} | {
"account_age_days": 271,
"account_id": "ACCT-9994F0D7DF95",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_2",
"session_entropy": 0.415
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 460,
"timestamp": "2026-01-03T11:37:00Z",
"transaction_amount_usd": 607000.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2481008.18,
"financial_exposure_usd": 3387221.21,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101184",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-01T19:44:00Z",
"trace_id": "7249f515-d92e-9348-0715-e2a0ac37660f"
} | {
"account_age_days": 377,
"account_id": "ACCT-854D48FB96AD",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_3",
"session_entropy": 0.751
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 516,
"timestamp": "2026-01-01T19:44:00Z",
"transaction_amount_usd": 117183.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.874,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 5803.17,
"financial_exposure_usd": 13127.6,
"recoverable_pct": 0.335
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104634",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-04T05:14:00Z",
"trace_id": "74a9520e-93c2-77ac-26e5-dee00834c73b"
} | {
"account_age_days": 1172,
"account_id": "ACCT-D69A749328AF",
"baseline_risk_score": 0.217,
"kyc_tier": "tier_3",
"session_entropy": 0.893
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 171,
"timestamp": "2026-01-04T01:46:00Z",
"transaction_amount_usd": 11.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3087828.01,
"financial_exposure_usd": 5796456.68,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102046",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "critical",
"timestamp": "2026-01-02T10:06:00Z",
"trace_id": "bfd22eab-9bad-b2fd-9c25-909b2443779e"
} | {
"account_age_days": 1689,
"account_id": "ACCT-80B118537C39",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_1",
"session_entropy": 0.688
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 161,
"timestamp": "2026-01-01T22:16:00Z",
"transaction_amount_usd": 17.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 560798.54,
"financial_exposure_usd": 801252.14,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107789",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-06T09:49:00Z",
"trace_id": "a30f51d1-66ac-6cc1-7389-737f9765518d"
} | {
"account_age_days": 541,
"account_id": "ACCT-15CA56412980",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_3",
"session_entropy": 0.454
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 724,
"timestamp": "2026-01-06T09:49:00Z",
"transaction_amount_usd": 5290.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.536,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1234.02,
"financial_exposure_usd": 2501.25,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100413",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "high",
"timestamp": "2026-01-01T06:53:00Z",
"trace_id": "dd5fdcf6-4c9a-7c98-7488-750342dabc8c"
} | {
"account_age_days": 624,
"account_id": "ACCT-CF10869C0ED1",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_3",
"session_entropy": 0.591
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 114,
"timestamp": "2026-01-01T06:53:00Z",
"transaction_amount_usd": 818.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.9,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 317191.67,
"financial_exposure_usd": 530265.45,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103475",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "medium",
"timestamp": "2026-01-03T09:55:00Z",
"trace_id": "fc3a05aa-9f10-6648-5509-69a1528526b2"
} | {
"account_age_days": 943,
"account_id": "ACCT-C15C4FA041F7",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_2",
"session_entropy": 0.162
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 729,
"timestamp": "2026-01-03T09:55:00Z",
"transaction_amount_usd": 553707.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.873,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1713989.71,
"financial_exposure_usd": 4186908.11,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109940",
"label": "benign",
"label_confidence": 0.482,
"severity": "low",
"timestamp": "2026-01-07T21:40:00Z",
"trace_id": "0ad7a024-d5bf-b6db-1290-36e1838ed8b0"
} | {
"account_age_days": 1725,
"account_id": "ACCT-358C02F20F5F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.374
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 140,
"timestamp": "2026-01-07T18:51:00Z",
"transaction_amount_usd": 19.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1232.98,
"financial_exposure_usd": 1767.16,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105931",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-05T02:51:00Z",
"trace_id": "8e0358f7-2966-cb01-8efd-99b49ddd07da"
} | {
"account_age_days": 348,
"account_id": "ACCT-AD0FF6DF63CF",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_1",
"session_entropy": 0.245
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 710,
"timestamp": "2026-01-05T02:51:00Z",
"transaction_amount_usd": 415438.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.627,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4412338.53,
"financial_exposure_usd": 6172519.08,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107281",
"label": "benign",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-06T01:21:00Z",
"trace_id": "2a5de94a-87f8-029b-fa4e-88d094c454ab"
} | {
"account_age_days": 1388,
"account_id": "ACCT-AEF02B6BC439",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_2",
"session_entropy": 0.534
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 999,
"timestamp": "2026-01-06T01:21:00Z",
"transaction_amount_usd": 5948.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1168.62,
"financial_exposure_usd": 2760.08,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105235",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "critical",
"timestamp": "2026-01-04T15:15:00Z",
"trace_id": "681a221b-5066-a337-d985-ac44e5290773"
} | {
"account_age_days": 1368,
"account_id": "ACCT-6B0048C4B13E",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_2",
"session_entropy": 0.512
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 399,
"timestamp": "2026-01-04T04:28:00Z",
"transaction_amount_usd": 20.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.432,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4605580.69,
"financial_exposure_usd": 5894811.41,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109521",
"label": "benign",
"label_confidence": 0.608,
"severity": "low",
"timestamp": "2026-01-07T14:41:00Z",
"trace_id": "3f678eaf-6f0d-80f6-f6bc-6ab2e90e8594"
} | {
"account_age_days": 1211,
"account_id": "ACCT-C88D21047A3E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.242
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 976,
"timestamp": "2026-01-07T14:41:00Z",
"transaction_amount_usd": 5662.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1457.27,
"financial_exposure_usd": 2147.51,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101957",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "high",
"timestamp": "2026-01-02T08:37:00Z",
"trace_id": "15ddcd9d-2f8e-c86d-8fd3-9d4ba65342d7"
} | {
"account_age_days": 904,
"account_id": "ACCT-705DC3FC5DA4",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_3",
"session_entropy": 0.718
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 704,
"timestamp": "2026-01-02T08:37:00Z",
"transaction_amount_usd": 95603.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.742,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1138339.85,
"financial_exposure_usd": 1177465.56,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108374",
"label": "benign",
"label_confidence": 0.622,
"severity": "medium",
"timestamp": "2026-01-06T19:34:00Z",
"trace_id": "a137086f-b876-a08f-6b9f-f80ee15301ec"
} | {
"account_age_days": 342,
"account_id": "ACCT-58EBABA4CF5C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.681
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1057,
"timestamp": "2026-01-06T19:34:00Z",
"transaction_amount_usd": 14670.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.674,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1532.13,
"financial_exposure_usd": 1892.21,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104064",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-03T19:44:00Z",
"trace_id": "217eb450-5c0c-62c7-9557-685ebf6f44c2"
} | {
"account_age_days": 890,
"account_id": "ACCT-938D981F3119",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_2",
"session_entropy": 0.648
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 479,
"timestamp": "2026-01-03T19:44:00Z",
"transaction_amount_usd": 97531.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.411,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3238998.78,
"financial_exposure_usd": 3504122.1,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104280",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "high",
"timestamp": "2026-01-03T23:20:00Z",
"trace_id": "240ccce5-ee2d-14a2-40e2-b003c94a9f8b"
} | {
"account_age_days": 1271,
"account_id": "ACCT-8089113D7775",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_2",
"session_entropy": 0.855
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 574,
"timestamp": "2026-01-03T23:20:00Z",
"transaction_amount_usd": 1397689.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.844,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3124483.99,
"financial_exposure_usd": 3501683.23,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103112",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "high",
"timestamp": "2026-01-03T03:52:00Z",
"trace_id": "7f791f84-b04e-a317-6a11-3a47c075440e"
} | {
"account_age_days": 686,
"account_id": "ACCT-170B2AF0494A",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_2",
"session_entropy": 0.521
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 327,
"timestamp": "2026-01-02T19:37:00Z",
"transaction_amount_usd": 15.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.431,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 219786.57,
"financial_exposure_usd": 288946.72,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103376",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "medium",
"timestamp": "2026-01-03T08:16:00Z",
"trace_id": "a8a772a4-8686-970c-7d92-6682d0648909"
} | {
"account_age_days": 902,
"account_id": "ACCT-909342733200",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_2",
"session_entropy": 0.327
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 112,
"timestamp": "2026-01-03T00:43:00Z",
"transaction_amount_usd": 19.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5873579,
"financial_exposure_usd": 6212217.73,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104541",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "medium",
"timestamp": "2026-01-04T03:41:00Z",
"trace_id": "0e127559-e4d6-aad2-a6bc-214e069ea311"
} | {
"account_age_days": 764,
"account_id": "ACCT-697966306272",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_3",
"session_entropy": 0.738
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 471,
"timestamp": "2026-01-04T03:41:00Z",
"transaction_amount_usd": 2011855.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 984622.99,
"financial_exposure_usd": 2313991.37,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109085",
"label": "benign",
"label_confidence": 0.67,
"severity": "low",
"timestamp": "2026-01-07T07:25:00Z",
"trace_id": "291fe110-ffc6-1a37-9042-cd348a5f9b83"
} | {
"account_age_days": 520,
"account_id": "ACCT-EE38F4875A42",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_2",
"session_entropy": 0.807
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 252,
"timestamp": "2026-01-07T07:25:00Z",
"transaction_amount_usd": 4871.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.776,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1859.39,
"financial_exposure_usd": 1873.25,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100133",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-01T02:13:00Z",
"trace_id": "5719d3e4-16d1-d768-1c83-90ba1672380e"
} | {
"account_age_days": 434,
"account_id": "ACCT-27177E595548",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_3",
"session_entropy": 0.804
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 721,
"timestamp": "2026-01-01T02:13:00Z",
"transaction_amount_usd": 89481.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.77,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 826944.45,
"financial_exposure_usd": 866913.76,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103064",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "low",
"timestamp": "2026-01-03T03:04:00Z",
"trace_id": "8fc75f50-4490-88ca-f44a-a942952946a5"
} | {
"account_age_days": 1464,
"account_id": "ACCT-310005133B84",
"baseline_risk_score": 0.587,
"kyc_tier": "tier_2",
"session_entropy": 0.617
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 795,
"timestamp": "2026-01-03T03:04:00Z",
"transaction_amount_usd": 116986.11
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 677613,
"financial_exposure_usd": 841316.69,
"recoverable_pct": 0.174
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109352",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-07T11:52:00Z",
"trace_id": "c723500e-349a-f7d4-c018-de492f66285f"
} | {
"account_age_days": 843,
"account_id": "ACCT-91C407F9B330",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.198
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 790,
"timestamp": "2026-01-07T11:52:00Z",
"transaction_amount_usd": 10450.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1208.27,
"financial_exposure_usd": 1919.07,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103771",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "low",
"timestamp": "2026-01-03T14:51:00Z",
"trace_id": "59158338-f946-e77f-a995-376d5b04b63f"
} | {
"account_age_days": 1988,
"account_id": "ACCT-B726ADE96B2D",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 115,
"timestamp": "2026-01-03T14:51:00Z",
"transaction_amount_usd": 1220271.46
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3339336.59,
"financial_exposure_usd": 5838366.14,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103305",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "critical",
"timestamp": "2026-01-03T07:05:00Z",
"trace_id": "39d86473-3ded-ba49-31fd-5134cc522672"
} | {
"account_age_days": 1172,
"account_id": "ACCT-B6B1D72F24BC",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_2",
"session_entropy": 0.47
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 208,
"timestamp": "2026-01-03T05:14:00Z",
"transaction_amount_usd": 22.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.41,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 511273.59,
"financial_exposure_usd": 740604.52,
"recoverable_pct": 0.327
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102444",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "medium",
"timestamp": "2026-01-02T16:44:00Z",
"trace_id": "c9128766-8658-d0f2-3c90-f0880d1f84df"
} | {
"account_age_days": 1994,
"account_id": "ACCT-5B10C9F4FEEC",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_1",
"session_entropy": 0.659
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 254,
"timestamp": "2026-01-02T16:44:00Z",
"transaction_amount_usd": 51526.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.916,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 580094.64,
"financial_exposure_usd": 808998.15,
"recoverable_pct": 0.105
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109140",
"label": "benign",
"label_confidence": 0.696,
"severity": "critical",
"timestamp": "2026-01-07T08:20:00Z",
"trace_id": "f98e9afc-4669-80f1-e249-1276495a0cd3"
} | {
"account_age_days": 746,
"account_id": "ACCT-56E0D962122C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.344
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 926,
"timestamp": "2026-01-07T08:20:00Z",
"transaction_amount_usd": 13518.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3291.16,
"financial_exposure_usd": 4246.14,
"recoverable_pct": 0.826
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105008",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "medium",
"timestamp": "2026-01-04T11:28:00Z",
"trace_id": "3f1f4674-63f3-2815-1f01-4d90370ebe5d"
} | {
"account_age_days": 1935,
"account_id": "ACCT-CD56B586AD4F",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_3",
"session_entropy": 0.38
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 95,
"timestamp": "2026-01-04T05:15:00Z",
"transaction_amount_usd": 7
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_co... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.64,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4984138.96,
"financial_exposure_usd": 5030176.38,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106703",
"label": "benign",
"label_confidence": 0.721,
"severity": "low",
"timestamp": "2026-01-05T15:43:00Z",
"trace_id": "47be2fb2-35b1-ad2a-72b0-28a2928043fd"
} | {
"account_age_days": 1467,
"account_id": "ACCT-ECF80A557D13",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.689
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 754,
"timestamp": "2026-01-05T15:43:00Z",
"transaction_amount_usd": 14867.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 41.82,
"financial_exposure_usd": 55.7,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105731",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-04T23:31:00Z",
"trace_id": "bfc1e047-7a60-b339-70a0-8910c55aac03"
} | {
"account_age_days": 317,
"account_id": "ACCT-0B2A1BFF4570",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.399
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 933,
"timestamp": "2026-01-04T23:31:00Z",
"transaction_amount_usd": 1253889.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4228780.35,
"financial_exposure_usd": 7129341.7,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102458",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "critical",
"timestamp": "2026-01-02T16:58:00Z",
"trace_id": "15730fab-ba74-e1c9-f905-141f8d47aa7f"
} | {
"account_age_days": 501,
"account_id": "ACCT-48BB00835052",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.548
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 323,
"timestamp": "2026-01-02T13:46:00Z",
"transaction_amount_usd": 9.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.352,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 805171.55,
"financial_exposure_usd": 1194840.21,
"recoverable_pct": 0.152
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103439",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-03T09:19:00Z",
"trace_id": "9e29b801-aad1-8e33-225c-620cedf9d2c5"
} | {
"account_age_days": 1857,
"account_id": "ACCT-11B57AC98EE6",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.816
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 155,
"timestamp": "2026-01-03T09:19:00Z",
"transaction_amount_usd": 828573.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.394,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3391404.89,
"financial_exposure_usd": 4181726.49,
"recoverable_pct": 0.798
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107603",
"label": "benign",
"label_confidence": 0.505,
"severity": "medium",
"timestamp": "2026-01-06T06:43:00Z",
"trace_id": "e988b67c-bfea-0e0d-886f-d9254c281887"
} | {
"account_age_days": 1660,
"account_id": "ACCT-0FB0110F1FCB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 358,
"timestamp": "2026-01-06T00:12:00Z",
"transaction_amount_usd": 21.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.733,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2789.15,
"financial_exposure_usd": 5170.3,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106136",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-05T06:16:00Z",
"trace_id": "56724cce-3b52-7483-7145-62ebde9a740e"
} | {
"account_age_days": 53,
"account_id": "ACCT-6511B95B6CAF",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 262,
"timestamp": "2026-01-05T06:16:00Z",
"transaction_amount_usd": 380088.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.585,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4362974.12,
"financial_exposure_usd": 4622903.96,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107233",
"label": "benign",
"label_confidence": 0.733,
"severity": "critical",
"timestamp": "2026-01-06T00:33:00Z",
"trace_id": "aaaecb55-3d59-091b-6379-2d274ef28f98"
} | {
"account_age_days": 805,
"account_id": "ACCT-1EE6EDBD0D90",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.475
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 160,
"timestamp": "2026-01-05T16:47:00Z",
"transaction_amount_usd": 23.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3246.82,
"financial_exposure_usd": 3403.28,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100521",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "high",
"timestamp": "2026-01-01T08:41:00Z",
"trace_id": "f65067e0-6b94-1b94-918f-979216cbc3cb"
} | {
"account_age_days": 1480,
"account_id": "ACCT-A6A96B789152",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.335
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 236,
"timestamp": "2026-01-01T08:41:00Z",
"transaction_amount_usd": 25692.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 318073.51,
"financial_exposure_usd": 539327.49,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102545",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-02T18:25:00Z",
"trace_id": "773d891b-1bea-4507-7729-39fcc9fde1eb"
} | {
"account_age_days": 622,
"account_id": "ACCT-A9DFE656F81A",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_2",
"session_entropy": 0.873
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 735,
"timestamp": "2026-01-02T18:25:00Z",
"transaction_amount_usd": 43346.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.949,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 214079.21,
"financial_exposure_usd": 385403.08,
"recoverable_pct": 0.047
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100778",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "critical",
"timestamp": "2026-01-01T12:58:00Z",
"trace_id": "82dbf415-4a7d-8752-ab8f-8ef2a5e25aa0"
} | {
"account_age_days": 42,
"account_id": "ACCT-A4074EC29359",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.673
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 88,
"timestamp": "2026-01-01T12:58:00Z",
"transaction_amount_usd": 114411.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.777,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 522796.66,
"financial_exposure_usd": 1164028.81,
"recoverable_pct": 0.04
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108417",
"label": "benign",
"label_confidence": 0.518,
"severity": "low",
"timestamp": "2026-01-06T20:17:00Z",
"trace_id": "7ee91fe6-5d43-b1e0-5adc-743ff634b2b0"
} | {
"account_age_days": 524,
"account_id": "ACCT-C64A04DEAFF7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.792
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 141,
"timestamp": "2026-01-06T09:19:00Z",
"transaction_amount_usd": 10.83
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1421.92,
"financial_exposure_usd": 2829.89,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103537",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-03T10:57:00Z",
"trace_id": "833900a8-f8ac-f563-0594-8d641b3841fe"
} | {
"account_age_days": 1706,
"account_id": "ACCT-E55CEA961D8C",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_3",
"session_entropy": 0.304
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 159,
"timestamp": "2026-01-03T01:04:00Z",
"transaction_amount_usd": 2.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3063579.74,
"financial_exposure_usd": 3784226.38,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105738",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-04T23:38:00Z",
"trace_id": "a652d1bb-e236-27e9-cdba-003cd12920e0"
} | {
"account_age_days": 950,
"account_id": "ACCT-3055E769BB66",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.827
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1040,
"timestamp": "2026-01-04T23:38:00Z",
"transaction_amount_usd": 2797792.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.937,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 140727.38,
"financial_exposure_usd": 230464.61,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100751",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-01T12:31:00Z",
"trace_id": "4b6a24ad-234b-f2fe-8f24-b0370d95d9a7"
} | {
"account_age_days": 1810,
"account_id": "ACCT-5B1AD512CB07",
"baseline_risk_score": 0.558,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 214,
"timestamp": "2026-01-01T10:17:00Z",
"transaction_amount_usd": 10.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.819,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 686775.3,
"financial_exposure_usd": 1172440.91,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101626",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-02T03:06:00Z",
"trace_id": "cb774aa6-274c-f567-d368-093b8bbdc200"
} | {
"account_age_days": 759,
"account_id": "ACCT-BB9BC1594F43",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 776,
"timestamp": "2026-01-02T03:06:00Z",
"transaction_amount_usd": 43690.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 235171.45,
"financial_exposure_usd": 285552.23,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104162",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-03T21:22:00Z",
"trace_id": "f73480dc-7480-c35a-112e-25af7737c4e9"
} | {
"account_age_days": 622,
"account_id": "ACCT-FFD47BA73FAF",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_1",
"session_entropy": 0.605
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 630,
"timestamp": "2026-01-03T21:22:00Z",
"transaction_amount_usd": 2330149.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.525,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1109176.31,
"financial_exposure_usd": 2406639.22,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102577",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "high",
"timestamp": "2026-01-02T18:57:00Z",
"trace_id": "ed277a11-906e-c813-2388-e61de7149159"
} | {
"account_age_days": 187,
"account_id": "ACCT-A6C4A74DED3D",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_1",
"session_entropy": 0.704
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 502,
"timestamp": "2026-01-02T18:57:00Z",
"transaction_amount_usd": 112251.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 652553.05,
"financial_exposure_usd": 1065396.2,
"recoverable_pct": 0.104
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105054",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "critical",
"timestamp": "2026-01-04T12:14:00Z",
"trace_id": "f2d86423-7e2e-39c6-e348-95f6371adc9e"
} | {
"account_age_days": 1716,
"account_id": "ACCT-6041DC012EB1",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_1",
"session_entropy": 0.547
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 307,
"timestamp": "2026-01-04T09:32:00Z",
"transaction_amount_usd": 22.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.622,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2306981.54,
"financial_exposure_usd": 5356581.3,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100897",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-01T14:57:00Z",
"trace_id": "d31e1d2c-4eb1-6c16-d733-909426b71b11"
} | {
"account_age_days": 1755,
"account_id": "ACCT-DE199B18574C",
"baseline_risk_score": 0.592,
"kyc_tier": "tier_1",
"session_entropy": 0.659
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 556,
"timestamp": "2026-01-01T14:57:00Z",
"transaction_amount_usd": 54586.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1001508.46,
"financial_exposure_usd": 1603625.91,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105887",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "critical",
"timestamp": "2026-01-05T02:07:00Z",
"trace_id": "1bd687a8-9299-5056-e5c3-bb76b26af45e"
} | {
"account_age_days": 851,
"account_id": "ACCT-44AF178AF19F",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_1",
"session_entropy": 0.31
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 144,
"timestamp": "2026-01-05T02:07:00Z",
"transaction_amount_usd": 2398218.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.781,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2688014.22,
"financial_exposure_usd": 5742307.51,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100373",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-01T06:13:00Z",
"trace_id": "7f317011-a7ee-d52d-c1f6-00272ced976e"
} | {
"account_age_days": 13,
"account_id": "ACCT-1C79AC854642",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_2",
"session_entropy": 0.813
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 213,
"timestamp": "2026-01-01T06:13:00Z",
"transaction_amount_usd": 740.98
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.739,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 203282.43,
"financial_exposure_usd": 221757.6,
"recoverable_pct": 0.222
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102543",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "medium",
"timestamp": "2026-01-02T18:23:00Z",
"trace_id": "e0b191ea-d973-76d7-1422-ff2313865654"
} | {
"account_age_days": 143,
"account_id": "ACCT-5640A1FB4894",
"baseline_risk_score": 0.523,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 298,
"timestamp": "2026-01-02T18:23:00Z",
"transaction_amount_usd": 99539.99
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.838,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 369633.31,
"financial_exposure_usd": 604980.26,
"recoverable_pct": 0.071
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105996",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "low",
"timestamp": "2026-01-05T03:56:00Z",
"trace_id": "5f5124cd-18ef-bcd6-dad2-983d34dade11"
} | {
"account_age_days": 58,
"account_id": "ACCT-CEEC81A67300",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_2",
"session_entropy": 0.254
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 912,
"timestamp": "2026-01-05T03:56:00Z",
"transaction_amount_usd": 991054.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.69,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5376616.8,
"financial_exposure_usd": 6527720.66,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109563",
"label": "benign",
"label_confidence": 0.506,
"severity": "low",
"timestamp": "2026-01-07T15:23:00Z",
"trace_id": "5638d8c3-0afd-edfb-d67f-4967edd4e98e"
} | {
"account_age_days": 1766,
"account_id": "ACCT-B17FCFE7D961",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.154
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 290,
"timestamp": "2026-01-07T13:28:00Z",
"transaction_amount_usd": 19.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.65,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 4368.54,
"financial_exposure_usd": 5966.49,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102700",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "medium",
"timestamp": "2026-01-02T21:00:00Z",
"trace_id": "6e7294b3-17d1-12e8-d6c3-600ee2997d9f"
} | {
"account_age_days": 866,
"account_id": "ACCT-94BBC08505B6",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_2",
"session_entropy": 0.31
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 1124,
"timestamp": "2026-01-02T21:00:00Z",
"transaction_amount_usd": 2990.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.748,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 295889.68,
"financial_exposure_usd": 336627.93,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106514",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-05T12:34:00Z",
"trace_id": "e5b63f88-f444-44f6-a3cb-cfb98def740b"
} | {
"account_age_days": 231,
"account_id": "ACCT-B6B898BDCBE9",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_1",
"session_entropy": 0.14
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 940,
"timestamp": "2026-01-05T12:34:00Z",
"transaction_amount_usd": 1333418.03
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.93,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 332714.32,
"financial_exposure_usd": 425452.1,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109147",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-07T08:27:00Z",
"trace_id": "107d4707-c2b3-160b-5314-ad9833af8f8b"
} | {
"account_age_days": 377,
"account_id": "ACCT-3ECC49E1E1CC",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.852
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 299,
"timestamp": "2026-01-07T01:51:00Z",
"transaction_amount_usd": 3.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2148.86,
"financial_exposure_usd": 4601.94,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104705",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-04T06:25:00Z",
"trace_id": "fee7f236-4c75-8aa7-b2de-6cef27365752"
} | {
"account_age_days": 1006,
"account_id": "ACCT-3F1810453058",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_2",
"session_entropy": 0.455
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 328,
"timestamp": "2026-01-03T20:02:00Z",
"transaction_amount_usd": 19.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.609,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4949619.78,
"financial_exposure_usd": 6992469.76,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108255",
"label": "benign",
"label_confidence": 0.667,
"severity": "low",
"timestamp": "2026-01-06T17:35:00Z",
"trace_id": "94e34226-4b8b-18fa-34b2-ce8b1c02ece7"
} | {
"account_age_days": 201,
"account_id": "ACCT-614CCB2894FA",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 241,
"timestamp": "2026-01-06T17:35:00Z",
"transaction_amount_usd": 3932.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4451.32,
"financial_exposure_usd": 6704.24,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100682",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "high",
"timestamp": "2026-01-01T11:22:00Z",
"trace_id": "ae56b5c0-a5b8-ca07-12de-13a4b2a273e9"
} | {
"account_age_days": 1957,
"account_id": "ACCT-9099B0323B60",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_2",
"session_entropy": 0.876
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 327,
"timestamp": "2026-01-01T04:11:00Z",
"transaction_amount_usd": 9.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.674,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 363094.21,
"financial_exposure_usd": 611134.67,
"recoverable_pct": 0.032
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101187",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-01T19:47:00Z",
"trace_id": "0357085e-f77e-0dcf-f84f-68b5b08e2bad"
} | {
"account_age_days": 992,
"account_id": "ACCT-216680A72350",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 307,
"timestamp": "2026-01-01T19:47:00Z",
"transaction_amount_usd": 44557.17
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.593,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 722266.34,
"financial_exposure_usd": 1127485.59,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106991",
"label": "benign",
"label_confidence": 0.579,
"severity": "high",
"timestamp": "2026-01-05T20:31:00Z",
"trace_id": "5d113ebb-c003-e7ae-a066-ea8e231a5273"
} | {
"account_age_days": 300,
"account_id": "ACCT-7DB362A844C8",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_2",
"session_entropy": 0.662
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 894,
"timestamp": "2026-01-05T20:31:00Z",
"transaction_amount_usd": 9699.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 238.65,
"financial_exposure_usd": 396.36,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100491",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "critical",
"timestamp": "2026-01-01T08:11:00Z",
"trace_id": "25c951cd-f2aa-ec2f-9c3d-e9624faa12c1"
} | {
"account_age_days": 1934,
"account_id": "ACCT-FF23DC199787",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_1",
"session_entropy": 0.806
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 828,
"timestamp": "2026-01-01T08:11:00Z",
"transaction_amount_usd": 85002.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.541,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 542960.58,
"financial_exposure_usd": 1084162.65,
"recoverable_pct": 0.1
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102549",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "critical",
"timestamp": "2026-01-02T18:29:00Z",
"trace_id": "74772b3d-4246-7692-00fe-08896abb25ef"
} | {
"account_age_days": 1652,
"account_id": "ACCT-A86A5A8C2F5D",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.666
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 158,
"timestamp": "2026-01-02T18:29:00Z",
"transaction_amount_usd": 110694.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.741,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 969327.98,
"financial_exposure_usd": 1478098.21,
"recoverable_pct": 0.181
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108516",
"label": "benign",
"label_confidence": 0.535,
"severity": "medium",
"timestamp": "2026-01-06T21:56:00Z",
"trace_id": "3ca79876-1f36-6c62-8bee-338f0cf5f03b"
} | {
"account_age_days": 561,
"account_id": "ACCT-4EF273FAD8DD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.846
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 220,
"timestamp": "2026-01-06T09:57:00Z",
"transaction_amount_usd": 6.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2427.29,
"financial_exposure_usd": 5125.88,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102631",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-02T19:51:00Z",
"trace_id": "5d4e56c4-ae8f-8d73-36d6-e5f48c064cd5"
} | {
"account_age_days": 454,
"account_id": "ACCT-F690350149E2",
"baseline_risk_score": 0.54,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 309,
"timestamp": "2026-01-02T08:43:00Z",
"transaction_amount_usd": 15.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.874,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 639162.21,
"financial_exposure_usd": 699464.19,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109962",
"label": "benign",
"label_confidence": 0.73,
"severity": "medium",
"timestamp": "2026-01-07T22:02:00Z",
"trace_id": "36f53105-55d9-cd6e-1f2b-9ebb880ed938"
} | {
"account_age_days": 1945,
"account_id": "ACCT-8518A7A23381",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.835
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 304,
"timestamp": "2026-01-07T22:02:00Z",
"transaction_amount_usd": 9446.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1921.5,
"financial_exposure_usd": 2971.15,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103357",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "low",
"timestamp": "2026-01-03T07:57:00Z",
"trace_id": "f5917577-571e-aaa4-40b7-ab68fc48c210"
} | {
"account_age_days": 1700,
"account_id": "ACCT-407854D87883",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_3",
"session_entropy": 0.717
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 734,
"timestamp": "2026-01-03T07:57:00Z",
"transaction_amount_usd": 1644375.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.435,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3018397.34,
"financial_exposure_usd": 3042445.12,
"recoverable_pct": 0.962
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102228",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-02T13:08:00Z",
"trace_id": "7479e4b5-6441-61c1-8b6f-d72dd25de7df"
} | {
"account_age_days": 1803,
"account_id": "ACCT-58EA7A81BA0A",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_1",
"session_entropy": 0.527
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 331,
"timestamp": "2026-01-02T13:08:00Z",
"transaction_amount_usd": 62695.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.548,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 644574.88,
"financial_exposure_usd": 1096460.79,
"recoverable_pct": 0.344
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102991",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "high",
"timestamp": "2026-01-03T01:51:00Z",
"trace_id": "599fea40-e7c4-c137-2da7-4a4e43a9cdce"
} | {
"account_age_days": 1336,
"account_id": "ACCT-CD2A766372ED",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.707
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 484,
"timestamp": "2026-01-03T01:51:00Z",
"transaction_amount_usd": 26698.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.579,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 234548.76,
"financial_exposure_usd": 252580.34,
"recoverable_pct": 0.09
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107962",
"label": "benign",
"label_confidence": 0.509,
"severity": "medium",
"timestamp": "2026-01-06T12:42:00Z",
"trace_id": "edbae23c-8bd9-c409-466f-fbd08112d623"
} | {
"account_age_days": 1479,
"account_id": "ACCT-6936552F56BD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.846
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 496,
"timestamp": "2026-01-06T12:42:00Z",
"transaction_amount_usd": 4952.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.67,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1192.73,
"financial_exposure_usd": 2820.77,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105552",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "medium",
"timestamp": "2026-01-04T20:32:00Z",
"trace_id": "c706809e-1802-ed51-9451-e35998d25efa"
} | {
"account_age_days": 1313,
"account_id": "ACCT-04E62179493D",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_3",
"session_entropy": 0.666
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 312,
"timestamp": "2026-01-04T09:09:00Z",
"transaction_amount_usd": 18.9
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.721,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4875154.43,
"financial_exposure_usd": 5375204.44,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101003",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "medium",
"timestamp": "2026-01-01T16:43:00Z",
"trace_id": "65cf46e5-434d-83fe-2058-fd249bcd1427"
} | {
"account_age_days": 1210,
"account_id": "ACCT-3E748545BED7",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_3",
"session_entropy": 0.686
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 328,
"timestamp": "2026-01-01T14:30:00Z",
"transaction_amount_usd": 0.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.662,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 168710.96,
"financial_exposure_usd": 267181.67,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102473",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-02T17:13:00Z",
"trace_id": "8f1694cd-6d83-ca73-755e-1890d8319254"
} | {
"account_age_days": 662,
"account_id": "ACCT-7285018FEB4E",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.879
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1133,
"timestamp": "2026-01-02T17:13:00Z",
"transaction_amount_usd": 20173.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 591686.16,
"financial_exposure_usd": 683896.57,
"recoverable_pct": 0.364
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107411",
"label": "benign",
"label_confidence": 0.516,
"severity": "high",
"timestamp": "2026-01-06T03:31:00Z",
"trace_id": "07510864-e41d-0ed9-8e12-0139d1047559"
} | {
"account_age_days": 1544,
"account_id": "ACCT-E51C95602D5A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.299
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 226,
"timestamp": "2026-01-06T03:31:00Z",
"transaction_amount_usd": 8737.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 615.31,
"financial_exposure_usd": 1328.58,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100276",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-01T04:36:00Z",
"trace_id": "d220f704-0da1-24c5-70ca-6f70cb3ffc4f"
} | {
"account_age_days": 1076,
"account_id": "ACCT-5C253A40BA76",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_1",
"session_entropy": 0.472
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 240,
"timestamp": "2025-12-31T17:45:00Z",
"transaction_amount_usd": 20.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.873,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 249836.44,
"financial_exposure_usd": 382946.19,
"recoverable_pct": 0.051
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101989",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-02T09:09:00Z",
"trace_id": "966ac265-03d2-1bea-f389-1341d86c15e9"
} | {
"account_age_days": 1254,
"account_id": "ACCT-3FD643187613",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.3
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1146,
"timestamp": "2026-01-02T09:09:00Z",
"transaction_amount_usd": 4517.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.469,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 983409.88,
"financial_exposure_usd": 1142724.89,
"recoverable_pct": 0.239
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100776",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-01T12:56:00Z",
"trace_id": "1f7dc802-082d-d7ba-ce84-04f97d4fa4db"
} | {
"account_age_days": 1265,
"account_id": "ACCT-000CED24277A",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_1",
"session_entropy": 0.648
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1084,
"timestamp": "2026-01-01T12:56:00Z",
"transaction_amount_usd": 88701.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.602,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 832756.72,
"financial_exposure_usd": 1132982.1,
"recoverable_pct": 0.13
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105462",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-04T19:02:00Z",
"trace_id": "447325e7-169a-306e-beba-742abd46b7c3"
} | {
"account_age_days": 687,
"account_id": "ACCT-B9EC02CF6379",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_1",
"session_entropy": 0.511
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 526,
"timestamp": "2026-01-04T19:02:00Z",
"transaction_amount_usd": 835598.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4549446.32,
"financial_exposure_usd": 6004336.03,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100987",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-01T16:27:00Z",
"trace_id": "0e2d69d6-a334-7990-e927-e96aa0afd6c5"
} | {
"account_age_days": 725,
"account_id": "ACCT-B2C45CCE75A4",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_3",
"session_entropy": 0.468
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1091,
"timestamp": "2026-01-01T16:27:00Z",
"transaction_amount_usd": 13537.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.727,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 153054.74,
"financial_exposure_usd": 276727.11,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109042",
"label": "benign",
"label_confidence": 0.46,
"severity": "low",
"timestamp": "2026-01-07T06:42:00Z",
"trace_id": "e3d75ae0-2079-b4ea-0325-a6e50a844303"
} | {
"account_age_days": 1332,
"account_id": "ACCT-4198A3B255E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.895
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 754,
"timestamp": "2026-01-07T06:42:00Z",
"transaction_amount_usd": 766.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.613,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1005.58,
"financial_exposure_usd": 1741.23,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109191",
"label": "benign",
"label_confidence": 0.74,
"severity": "low",
"timestamp": "2026-01-07T09:11:00Z",
"trace_id": "63592b22-ad44-a322-d93a-4cbe8cc212ba"
} | {
"account_age_days": 1799,
"account_id": "ACCT-83EAF4353096",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.689
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 820,
"timestamp": "2026-01-07T09:11:00Z",
"transaction_amount_usd": 10184.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2693.12,
"financial_exposure_usd": 3796.03,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106259",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "low",
"timestamp": "2026-01-05T08:19:00Z",
"trace_id": "bb042abe-daca-c926-601c-0d356d166597"
} | {
"account_age_days": 1144,
"account_id": "ACCT-87FB6646F7FB",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_1",
"session_entropy": 0.228
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 364,
"timestamp": "2026-01-05T04:19:00Z",
"transaction_amount_usd": 0.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1578620.73,
"financial_exposure_usd": 2058886.4,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.