schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100062",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-01T01:02:00Z",
"trace_id": "737cf8b5-6356-1add-685a-9f2b4236c0bf"
} | {
"account_age_days": 1164,
"account_id": "ACCT-2E6D7A041D57",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 209,
"timestamp": "2026-01-01T01:02:00Z",
"transaction_amount_usd": 38310.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.627,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 113213.52,
"financial_exposure_usd": 197101.63,
"recoverable_pct": 0.057
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104610",
"label": "fraudulent",
"label_confidence": 0.735,
"severity": "high",
"timestamp": "2026-01-04T04:50:00Z",
"trace_id": "a6705712-6aac-b1dd-c6b9-e3404a3ff662"
} | {
"account_age_days": 368,
"account_id": "ACCT-F010A7F52DFF",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_3",
"session_entropy": 0.833
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 753,
"timestamp": "2026-01-04T04:50:00Z",
"transaction_amount_usd": 1793733.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3230947.2,
"financial_exposure_usd": 7855165.89,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102554",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "critical",
"timestamp": "2026-01-02T18:34:00Z",
"trace_id": "cfd348e7-a788-d8eb-13de-d8d2a774e436"
} | {
"account_age_days": 363,
"account_id": "ACCT-F9A20BE4C3CF",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_1",
"session_entropy": 0.844
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 520,
"timestamp": "2026-01-02T18:34:00Z",
"transaction_amount_usd": 25293.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 445272.53,
"financial_exposure_usd": 989402.22,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108097",
"label": "benign",
"label_confidence": 0.548,
"severity": "medium",
"timestamp": "2026-01-06T14:57:00Z",
"trace_id": "e3fcbc79-780c-38dd-760c-b520123888a3"
} | {
"account_age_days": 991,
"account_id": "ACCT-CE60648B7ECE",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.845
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1193,
"timestamp": "2026-01-06T14:57:00Z",
"transaction_amount_usd": 1653.24
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2982.31,
"financial_exposure_usd": 4382.77,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100626",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "low",
"timestamp": "2026-01-01T10:26:00Z",
"trace_id": "08e130ae-2f65-0efa-40ac-67a19bf4a1ac"
} | {
"account_age_days": 1781,
"account_id": "ACCT-AD28570EC3D3",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_2",
"session_entropy": 0.138
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1012,
"timestamp": "2026-01-01T10:26:00Z",
"transaction_amount_usd": 107617.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.935,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 193379.2,
"financial_exposure_usd": 198784.71,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109518",
"label": "benign",
"label_confidence": 0.67,
"severity": "low",
"timestamp": "2026-01-07T14:38:00Z",
"trace_id": "543de1ca-c6cd-0f90-ff5a-2f114c0ba56d"
} | {
"account_age_days": 784,
"account_id": "ACCT-948914E11F77",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 683,
"timestamp": "2026-01-07T14:38:00Z",
"transaction_amount_usd": 183.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3251.96,
"financial_exposure_usd": 6926.77,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100522",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "critical",
"timestamp": "2026-01-01T08:42:00Z",
"trace_id": "c7edf53f-7b86-29f6-b98a-8ff57eb4f468"
} | {
"account_age_days": 237,
"account_id": "ACCT-D76C1EDE4745",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_1",
"session_entropy": 0.597
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 188,
"timestamp": "2025-12-31T22:09:00Z",
"transaction_amount_usd": 3.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.86,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 904066.06,
"financial_exposure_usd": 1286088.35,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104125",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-03T20:45:00Z",
"trace_id": "df1d28e7-bbc5-2ded-2d06-23d39015a4a3"
} | {
"account_age_days": 1468,
"account_id": "ACCT-57DBF6BEB1CE",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_1",
"session_entropy": 0.206
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 994,
"timestamp": "2026-01-03T20:45:00Z",
"transaction_amount_usd": 1864465.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.791,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6464289.55,
"financial_exposure_usd": 6775902.01,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103451",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "low",
"timestamp": "2026-01-03T09:31:00Z",
"trace_id": "63d9ac5e-7b7b-2fec-999d-51e56485a75b"
} | {
"account_age_days": 1180,
"account_id": "ACCT-EFEABB92CE78",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_3",
"session_entropy": 0.251
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 624,
"timestamp": "2026-01-03T09:31:00Z",
"transaction_amount_usd": 2598255.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.877,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1344003.15,
"financial_exposure_usd": 3008168.38,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105817",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "high",
"timestamp": "2026-01-05T00:57:00Z",
"trace_id": "3e82f1e3-4773-5fc9-babc-934b173bffaf"
} | {
"account_age_days": 786,
"account_id": "ACCT-89F1C42898C8",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.203
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1087,
"timestamp": "2026-01-05T00:57:00Z",
"transaction_amount_usd": 2837488.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.374,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2206176.49,
"financial_exposure_usd": 4566655.36,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102289",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-02T14:09:00Z",
"trace_id": "6c5f451a-d9cd-8db7-a730-5db6e53490be"
} | {
"account_age_days": 912,
"account_id": "ACCT-37C4D802B1FC",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 642,
"timestamp": "2026-01-02T14:09:00Z",
"transaction_amount_usd": 68360.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.386,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 453618.48,
"financial_exposure_usd": 867537.11,
"recoverable_pct": 0.274
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105550",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-04T20:30:00Z",
"trace_id": "771e6d32-3d91-03ec-b0c3-a9107e06a03f"
} | {
"account_age_days": 1023,
"account_id": "ACCT-156DFA65236A",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 290,
"timestamp": "2026-01-04T12:25:00Z",
"transaction_amount_usd": 7.63
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.747,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 745506.28,
"financial_exposure_usd": 1289782.58,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100058",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-01T00:58:00Z",
"trace_id": "cab24f24-1744-ee3f-d36e-c1bd000b1f5e"
} | {
"account_age_days": 1136,
"account_id": "ACCT-87C5F526011C",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_2",
"session_entropy": 0.726
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 1014,
"timestamp": "2026-01-01T00:58:00Z",
"transaction_amount_usd": 76685.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 390302.44,
"financial_exposure_usd": 478845.45,
"recoverable_pct": 0.148
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107335",
"label": "benign",
"label_confidence": 0.671,
"severity": "medium",
"timestamp": "2026-01-06T02:15:00Z",
"trace_id": "8f91715d-0f67-9b9b-077f-51a3c71a7231"
} | {
"account_age_days": 457,
"account_id": "ACCT-79BC6F98E1BD",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_1",
"session_entropy": 0.131
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 201,
"timestamp": "2026-01-05T20:55:00Z",
"transaction_amount_usd": 6.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2685.53,
"financial_exposure_usd": 4097.41,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107198",
"label": "benign",
"label_confidence": 0.489,
"severity": "medium",
"timestamp": "2026-01-05T23:58:00Z",
"trace_id": "8df7600d-8522-438d-6ade-ae4a6b990a56"
} | {
"account_age_days": 37,
"account_id": "ACCT-3711444964DB",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_2",
"session_entropy": 0.937
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 191,
"timestamp": "2026-01-05T17:27:00Z",
"transaction_amount_usd": 13.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.563,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 879.45,
"financial_exposure_usd": 1066.17,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108899",
"label": "benign",
"label_confidence": 0.523,
"severity": "medium",
"timestamp": "2026-01-07T04:19:00Z",
"trace_id": "8575da02-253e-03ff-7a07-0806009c5231"
} | {
"account_age_days": 1490,
"account_id": "ACCT-CAB98585CA20",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.652
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 234,
"timestamp": "2026-01-07T04:19:00Z",
"transaction_amount_usd": 13071.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1053.25,
"financial_exposure_usd": 1438.26,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107436",
"label": "benign",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-06T03:56:00Z",
"trace_id": "f6ad5041-c2e2-fcc1-1d7d-0ac0f999c509"
} | {
"account_age_days": 1236,
"account_id": "ACCT-4E9EFA70E1D4",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_3",
"session_entropy": 0.258
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1064,
"timestamp": "2026-01-06T03:56:00Z",
"transaction_amount_usd": 8412.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.489,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1826.77,
"financial_exposure_usd": 4557.77,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106388",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-05T10:28:00Z",
"trace_id": "7ec1bcdd-20c3-0549-5a85-1dece41abfbe"
} | {
"account_age_days": 1281,
"account_id": "ACCT-1C8603D2F93F",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_1",
"session_entropy": 0.379
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 125,
"timestamp": "2026-01-04T23:56:00Z",
"transaction_amount_usd": 1.95
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.53,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4709645.88,
"financial_exposure_usd": 5978981.59,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102749",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-02T21:49:00Z",
"trace_id": "475c8fa2-16ca-59db-e98a-1e64754c7feb"
} | {
"account_age_days": 369,
"account_id": "ACCT-AC7CEB03CE07",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_1",
"session_entropy": 0.21
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 130,
"timestamp": "2026-01-02T20:53:00Z",
"transaction_amount_usd": 10.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.697,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 233154.56,
"financial_exposure_usd": 468124.53,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103690",
"label": "fraudulent",
"label_confidence": 0.626,
"severity": "medium",
"timestamp": "2026-01-03T13:30:00Z",
"trace_id": "4e6ada41-c9f9-c835-b9c6-b5d537c67fdb"
} | {
"account_age_days": 1015,
"account_id": "ACCT-0B5E32FCECBD",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_3",
"session_entropy": 0.121
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 434,
"timestamp": "2026-01-03T13:30:00Z",
"transaction_amount_usd": 783896.85
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.498,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2280466.15,
"financial_exposure_usd": 5320519.85,
"recoverable_pct": 0.838
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102002",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "high",
"timestamp": "2026-01-02T09:22:00Z",
"trace_id": "47b1472d-1fd8-9aac-07df-fb3558eb2d02"
} | {
"account_age_days": 1439,
"account_id": "ACCT-1BD410953961",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 387,
"timestamp": "2026-01-02T07:30:00Z",
"transaction_amount_usd": 4.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.783,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 939776.45,
"financial_exposure_usd": 1210603.96,
"recoverable_pct": 0.19
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109700",
"label": "benign",
"label_confidence": 0.712,
"severity": "medium",
"timestamp": "2026-01-07T17:40:00Z",
"trace_id": "6068e344-6975-174e-0dd2-1667762fa9ff"
} | {
"account_age_days": 1858,
"account_id": "ACCT-F4C2519EB0F7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.908
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 765,
"timestamp": "2026-01-07T17:40:00Z",
"transaction_amount_usd": 4678.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 842.23,
"financial_exposure_usd": 980.49,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105294",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-04T16:14:00Z",
"trace_id": "1a009d7e-0dff-afc1-b482-5036a109bf07"
} | {
"account_age_days": 1479,
"account_id": "ACCT-91064BD04D77",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.187
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 108,
"timestamp": "2026-01-04T09:46:00Z",
"transaction_amount_usd": 9.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1272523.17,
"financial_exposure_usd": 3143924.79,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104851",
"label": "fraudulent",
"label_confidence": 0.74,
"severity": "medium",
"timestamp": "2026-01-04T08:51:00Z",
"trace_id": "b68a67d6-5e5d-8393-b568-6cd3ba946d7f"
} | {
"account_age_days": 166,
"account_id": "ACCT-FDBA9FAE8695",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_3",
"session_entropy": 0.563
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 97,
"timestamp": "2026-01-04T07:49:00Z",
"transaction_amount_usd": 14.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3019510.11,
"financial_exposure_usd": 6648836.67,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108977",
"label": "benign",
"label_confidence": 0.693,
"severity": "low",
"timestamp": "2026-01-07T05:37:00Z",
"trace_id": "0db8257d-2081-c4d3-7587-0c88ab991377"
} | {
"account_age_days": 1809,
"account_id": "ACCT-0D1072771715",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.438
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 421,
"timestamp": "2026-01-07T05:37:00Z",
"transaction_amount_usd": 7845.51
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 697.97,
"financial_exposure_usd": 883.14,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105667",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "high",
"timestamp": "2026-01-04T22:27:00Z",
"trace_id": "6818b57f-223a-2031-329a-0b866e3e6108"
} | {
"account_age_days": 876,
"account_id": "ACCT-F7125D3947A0",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_1",
"session_entropy": 0.22
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 374,
"timestamp": "2026-01-04T22:27:00Z",
"transaction_amount_usd": 1962814.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.404,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2873212.65,
"financial_exposure_usd": 5231186.57,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106885",
"label": "benign",
"label_confidence": 0.561,
"severity": "low",
"timestamp": "2026-01-05T18:45:00Z",
"trace_id": "c479657f-7e91-38ad-6e5e-2936a5c81156"
} | {
"account_age_days": 844,
"account_id": "ACCT-FA4F726C403C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.371
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 442,
"timestamp": "2026-01-05T18:45:00Z",
"transaction_amount_usd": 8639.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.668,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7171.07,
"financial_exposure_usd": 7729.19,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108078",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-06T14:38:00Z",
"trace_id": "bc3fea2e-8f82-3ddb-86a4-102a6f1463fa"
} | {
"account_age_days": 162,
"account_id": "ACCT-91204B34E07E",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.546
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 557,
"timestamp": "2026-01-06T14:38:00Z",
"transaction_amount_usd": 809.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108973",
"label": "benign",
"label_confidence": 0.719,
"severity": "medium",
"timestamp": "2026-01-07T05:33:00Z",
"trace_id": "14997a1a-0492-b50d-e205-f0e20d7d9deb"
} | {
"account_age_days": 700,
"account_id": "ACCT-8313D7A09F84",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_2",
"session_entropy": 0.71
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1140,
"timestamp": "2026-01-07T05:33:00Z",
"transaction_amount_usd": 13124.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1070.92,
"financial_exposure_usd": 2383.75,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106512",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "critical",
"timestamp": "2026-01-05T12:32:00Z",
"trace_id": "5bfe61f6-2b1a-45b8-8648-0f0fd2f89075"
} | {
"account_age_days": 954,
"account_id": "ACCT-B8DC2C52E079",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.597
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 900,
"timestamp": "2026-01-05T12:32:00Z",
"transaction_amount_usd": 1917778.5
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3274628.09,
"financial_exposure_usd": 4463922.75,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101698",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-02T04:18:00Z",
"trace_id": "b758eda1-6f8d-c504-0bf7-6fc99e114b45"
} | {
"account_age_days": 1119,
"account_id": "ACCT-6FB2A7F89B70",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_1",
"session_entropy": 0.912
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 908,
"timestamp": "2026-01-02T04:18:00Z",
"transaction_amount_usd": 108011.6
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.796,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 428554.86,
"financial_exposure_usd": 912535.69,
"recoverable_pct": 0.235
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104056",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "low",
"timestamp": "2026-01-03T19:36:00Z",
"trace_id": "ba4ee0e9-6a6b-3a1c-699a-922848a88b1f"
} | {
"account_age_days": 116,
"account_id": "ACCT-EAE283443C35",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_3",
"session_entropy": 0.871
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 927,
"timestamp": "2026-01-03T19:36:00Z",
"transaction_amount_usd": 565259.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3207034.19,
"financial_exposure_usd": 5645669.85,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101213",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-01T20:13:00Z",
"trace_id": "f3101f22-5514-bcb4-0fd7-280481a8171c"
} | {
"account_age_days": 1764,
"account_id": "ACCT-1D3360114135",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_3",
"session_entropy": 0.152
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 262,
"timestamp": "2026-01-01T14:34:00Z",
"transaction_amount_usd": 17.9
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.612,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 519038.42,
"financial_exposure_usd": 701049.79,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104304",
"label": "fraudulent",
"label_confidence": 0.74,
"severity": "medium",
"timestamp": "2026-01-03T23:44:00Z",
"trace_id": "a0610cb2-46d3-c35a-b25f-8a74f96a2efd"
} | {
"account_age_days": 879,
"account_id": "ACCT-56E3B2723BA5",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.33
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 684,
"timestamp": "2026-01-03T23:44:00Z",
"transaction_amount_usd": 1345889.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.715,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 247034.5,
"financial_exposure_usd": 478967.21,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100015",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "medium",
"timestamp": "2026-01-01T00:15:00Z",
"trace_id": "18dfbc3c-a0d4-de3d-2303-f6c6d69d42f1"
} | {
"account_age_days": 456,
"account_id": "ACCT-53F8382B8FB8",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.878
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 349,
"timestamp": "2026-01-01T00:15:00Z",
"transaction_amount_usd": 37417.48
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.731,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 696459.35,
"financial_exposure_usd": 736501.01,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101726",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "critical",
"timestamp": "2026-01-02T04:46:00Z",
"trace_id": "c0f2ea08-1617-49c6-e548-c0b45d273777"
} | {
"account_age_days": 149,
"account_id": "ACCT-B35D87385C3B",
"baseline_risk_score": 0.557,
"kyc_tier": "tier_1",
"session_entropy": 0.489
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 348,
"timestamp": "2026-01-02T04:46:00Z",
"transaction_amount_usd": 72758.93
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.71,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 317618.14,
"financial_exposure_usd": 348223.57,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103171",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-03T04:51:00Z",
"trace_id": "dcb9d619-356b-a329-ca10-4f5c3e4cdd9d"
} | {
"account_age_days": 1317,
"account_id": "ACCT-D51DCD0269D2",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.387
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 259,
"timestamp": "2026-01-03T01:02:00Z",
"transaction_amount_usd": 14.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.781,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 221207.65,
"financial_exposure_usd": 261406.4,
"recoverable_pct": 0.085
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108737",
"label": "benign",
"label_confidence": 0.568,
"severity": "medium",
"timestamp": "2026-01-07T01:37:00Z",
"trace_id": "a3373c59-91cc-3651-ff7c-a2927a02c5a7"
} | {
"account_age_days": 156,
"account_id": "ACCT-F0940C203824",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 893,
"timestamp": "2026-01-07T01:37:00Z",
"transaction_amount_usd": 2056.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.56,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1883.87,
"financial_exposure_usd": 2789.62,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103400",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "critical",
"timestamp": "2026-01-03T08:40:00Z",
"trace_id": "54d7dd31-f9e4-5b82-6e97-ee75cf72babb"
} | {
"account_age_days": 1751,
"account_id": "ACCT-242981394652",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.412
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1118,
"timestamp": "2026-01-03T08:40:00Z",
"transaction_amount_usd": 719505.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4979881.94,
"financial_exposure_usd": 6390749.28,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102837",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "critical",
"timestamp": "2026-01-02T23:17:00Z",
"trace_id": "d04e6092-46f5-52f0-b08b-2b9e30f024ed"
} | {
"account_age_days": 196,
"account_id": "ACCT-F975561B10F3",
"baseline_risk_score": 0.28,
"kyc_tier": "tier_3",
"session_entropy": 0.121
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 762,
"timestamp": "2026-01-02T23:17:00Z",
"transaction_amount_usd": 25376.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 626917.12,
"financial_exposure_usd": 644648.35,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101874",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "medium",
"timestamp": "2026-01-02T07:14:00Z",
"trace_id": "9ebc63a6-726b-be23-2cc3-977cff216814"
} | {
"account_age_days": 1569,
"account_id": "ACCT-E5DC760A6BB0",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_1",
"session_entropy": 0.502
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 187,
"timestamp": "2026-01-01T20:14:00Z",
"transaction_amount_usd": 23.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 242016.53,
"financial_exposure_usd": 522561.84,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103266",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-03T06:26:00Z",
"trace_id": "c18e9807-bae9-ceb0-9df3-01a60f883544"
} | {
"account_age_days": 1316,
"account_id": "ACCT-9D96BA21B2E7",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.391
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 926,
"timestamp": "2026-01-03T06:26:00Z",
"transaction_amount_usd": 13630.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.545,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 823191.25,
"financial_exposure_usd": 838526.98,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105735",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "low",
"timestamp": "2026-01-04T23:35:00Z",
"trace_id": "0eabe955-98e1-fa9b-f30f-049e958d2f68"
} | {
"account_age_days": 281,
"account_id": "ACCT-1B6927AF2245",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_1",
"session_entropy": 0.123
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 521,
"timestamp": "2026-01-04T23:35:00Z",
"transaction_amount_usd": 2845439.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1738848.37,
"financial_exposure_usd": 2127320.1,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100742",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "critical",
"timestamp": "2026-01-01T12:22:00Z",
"trace_id": "a26fcc48-d54c-d653-5a07-e1761cc546c8"
} | {
"account_age_days": 359,
"account_id": "ACCT-079F99AF4F33",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_3",
"session_entropy": 0.677
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 92,
"timestamp": "2026-01-01T01:48:00Z",
"transaction_amount_usd": 9.56
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.819,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 99847.25,
"financial_exposure_usd": 130173.7,
"recoverable_pct": 0.089
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100948",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "high",
"timestamp": "2026-01-01T15:48:00Z",
"trace_id": "00b14327-7cfb-480f-cbef-0230dd78d426"
} | {
"account_age_days": 1772,
"account_id": "ACCT-586378E64EA3",
"baseline_risk_score": 0.603,
"kyc_tier": "tier_3",
"session_entropy": 0.121
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 424,
"timestamp": "2026-01-01T15:48:00Z",
"transaction_amount_usd": 53120.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.905,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 304633.63,
"financial_exposure_usd": 375475.07,
"recoverable_pct": 0.509
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101495",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "high",
"timestamp": "2026-01-02T00:55:00Z",
"trace_id": "6549078e-6574-704e-68db-a78df6615097"
} | {
"account_age_days": 841,
"account_id": "ACCT-63DFF1A0B233",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.752
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 186,
"timestamp": "2026-01-01T19:50:00Z",
"transaction_amount_usd": 6.38
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.586,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 864607.71,
"financial_exposure_usd": 921219.5,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101803",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "critical",
"timestamp": "2026-01-02T06:03:00Z",
"trace_id": "a19a0559-af71-69b6-101d-ae432093b7e1"
} | {
"account_age_days": 1504,
"account_id": "ACCT-815D53D4FAF0",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_2",
"session_entropy": 0.425
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 388,
"timestamp": "2026-01-02T06:03:00Z",
"transaction_amount_usd": 60223.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 676740.88,
"financial_exposure_usd": 802760.52,
"recoverable_pct": 0.211
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104975",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "low",
"timestamp": "2026-01-04T10:55:00Z",
"trace_id": "9552a4d1-d534-493e-8140-363c87bd945e"
} | {
"account_age_days": 1601,
"account_id": "ACCT-58F6C18F65A4",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_1",
"session_entropy": 0.217
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 251,
"timestamp": "2026-01-04T01:40:00Z",
"transaction_amount_usd": 4.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.442,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1722499.2,
"financial_exposure_usd": 2551439.37,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105630",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "critical",
"timestamp": "2026-01-04T21:50:00Z",
"trace_id": "e15f7c8e-7e79-d492-286a-b18624c8e973"
} | {
"account_age_days": 965,
"account_id": "ACCT-4AE9FBC12DDA",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 318,
"timestamp": "2026-01-04T18:25:00Z",
"transaction_amount_usd": 20.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.654,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1205626.14,
"financial_exposure_usd": 2994398.9,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106430",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "high",
"timestamp": "2026-01-05T11:10:00Z",
"trace_id": "0e5da61f-e5c7-8b47-e36a-763ec1f319e3"
} | {
"account_age_days": 46,
"account_id": "ACCT-76C5394BE1BF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.687
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 862,
"timestamp": "2026-01-05T11:10:00Z",
"transaction_amount_usd": 613841.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.534,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3762611.62,
"financial_exposure_usd": 7128317.05,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104329",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "medium",
"timestamp": "2026-01-04T00:09:00Z",
"trace_id": "109bcd77-35c9-7c5d-87ec-b0b21f8ee64c"
} | {
"account_age_days": 63,
"account_id": "ACCT-845A4931BEB4",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_2",
"session_entropy": 0.252
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 907,
"timestamp": "2026-01-04T00:09:00Z",
"transaction_amount_usd": 2200775.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.592,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7653091.46,
"financial_exposure_usd": 8473617.01,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107610",
"label": "benign",
"label_confidence": 0.644,
"severity": "low",
"timestamp": "2026-01-06T06:50:00Z",
"trace_id": "205bfad9-4e6a-23e8-40de-60508545e25f"
} | {
"account_age_days": 266,
"account_id": "ACCT-DF972D8F16AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.933
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1026,
"timestamp": "2026-01-06T06:50:00Z",
"transaction_amount_usd": 11157.56
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3922.89,
"financial_exposure_usd": 8602.65,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101251",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "medium",
"timestamp": "2026-01-01T20:51:00Z",
"trace_id": "7f741713-3edd-3716-6b9b-a1c9c83d3502"
} | {
"account_age_days": 233,
"account_id": "ACCT-9FE55AD56CAC",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_3",
"session_entropy": 0.342
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 899,
"timestamp": "2026-01-01T20:51:00Z",
"transaction_amount_usd": 58071.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.894,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 532641.06,
"financial_exposure_usd": 692195.57,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107618",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-06T06:58:00Z",
"trace_id": "7b43ebbd-7342-202e-7e63-7ee83b20fea3"
} | {
"account_age_days": 1482,
"account_id": "ACCT-1C99AA5F3BA3",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_2",
"session_entropy": 0.614
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 970,
"timestamp": "2026-01-06T06:58:00Z",
"transaction_amount_usd": 7386.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2486.7,
"financial_exposure_usd": 6063.78,
"recoverable_pct": 0.509
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107566",
"label": "benign",
"label_confidence": 0.71,
"severity": "low",
"timestamp": "2026-01-06T06:06:00Z",
"trace_id": "7d8fb3cf-111e-f23f-91cf-6c55fe436f86"
} | {
"account_age_days": 1787,
"account_id": "ACCT-0244845BC0F7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.188
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 529,
"timestamp": "2026-01-06T06:06:00Z",
"transaction_amount_usd": 10344.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4637.11,
"financial_exposure_usd": 8811.24,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109634",
"label": "benign",
"label_confidence": 0.569,
"severity": "low",
"timestamp": "2026-01-07T16:34:00Z",
"trace_id": "5f92628c-f7bd-1f34-394f-88f6de973bc8"
} | {
"account_age_days": 1675,
"account_id": "ACCT-C8A0F4CB3428",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.918
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 542,
"timestamp": "2026-01-07T16:34:00Z",
"transaction_amount_usd": 7319.32
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2060.72,
"financial_exposure_usd": 3143.6,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104414",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "high",
"timestamp": "2026-01-04T01:34:00Z",
"trace_id": "8f9b45d2-ead8-e0c5-bab7-b34aef39fe39"
} | {
"account_age_days": 1371,
"account_id": "ACCT-DCCCFDDB0384",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_3",
"session_entropy": 0.23
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 814,
"timestamp": "2026-01-04T01:34:00Z",
"transaction_amount_usd": 2668945.79
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.862,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1791913.83,
"financial_exposure_usd": 3450861.98,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102952",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "medium",
"timestamp": "2026-01-03T01:12:00Z",
"trace_id": "d7132602-84a6-ea80-8b17-c9032aba1371"
} | {
"account_age_days": 19,
"account_id": "ACCT-AE9F1F71644E",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1025,
"timestamp": "2026-01-03T01:12:00Z",
"transaction_amount_usd": 19269.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.588,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 498324.23,
"financial_exposure_usd": 878651.03,
"recoverable_pct": 0.033
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106664",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "high",
"timestamp": "2026-01-05T15:04:00Z",
"trace_id": "49a12602-2337-95af-1ea8-a13711939c5e"
} | {
"account_age_days": 693,
"account_id": "ACCT-EDE02CBF6CA2",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_1",
"session_entropy": 0.189
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 156,
"timestamp": "2026-01-05T15:04:00Z",
"transaction_amount_usd": 1218116.48
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.426,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5632331.76,
"financial_exposure_usd": 6092778.33,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104595",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "medium",
"timestamp": "2026-01-04T04:35:00Z",
"trace_id": "a30b3f10-50e6-5cfa-ebd9-88dd4ecce408"
} | {
"account_age_days": 1497,
"account_id": "ACCT-9C266C01D941",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.88
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 656,
"timestamp": "2026-01-04T04:35:00Z",
"transaction_amount_usd": 1751072.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.795,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1661019.48,
"financial_exposure_usd": 2489100.23,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105558",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "high",
"timestamp": "2026-01-04T20:38:00Z",
"trace_id": "64daec6f-44c4-0e1f-83e9-8f0753a21b14"
} | {
"account_age_days": 843,
"account_id": "ACCT-FE2D66A3F33E",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_2",
"session_entropy": 0.39
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1006,
"timestamp": "2026-01-04T20:38:00Z",
"transaction_amount_usd": 1643047.58
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.598,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6261395.34,
"financial_exposure_usd": 6677831.73,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103712",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-03T13:52:00Z",
"trace_id": "4083c97a-5c36-9290-a870-2612ea529b52"
} | {
"account_age_days": 190,
"account_id": "ACCT-C0D4D8B56FB5",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1172,
"timestamp": "2026-01-03T13:52:00Z",
"transaction_amount_usd": 1382914.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.855,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1907773.51,
"financial_exposure_usd": 2221926.37,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109329",
"label": "benign",
"label_confidence": 0.658,
"severity": "low",
"timestamp": "2026-01-07T11:29:00Z",
"trace_id": "b6eab586-4229-da29-7c3a-f3e4ff346a36"
} | {
"account_age_days": 12,
"account_id": "ACCT-E71852C2BE4D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1100,
"timestamp": "2026-01-07T11:29:00Z",
"transaction_amount_usd": 751.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4064.64,
"financial_exposure_usd": 4686.96,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103697",
"label": "fraudulent",
"label_confidence": 0.714,
"severity": "medium",
"timestamp": "2026-01-03T13:37:00Z",
"trace_id": "e72fa252-375b-80ae-697e-d3dbc1021f41"
} | {
"account_age_days": 1010,
"account_id": "ACCT-9AF813ED02D5",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.684
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1141,
"timestamp": "2026-01-03T13:37:00Z",
"transaction_amount_usd": 1456659.86
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.76,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2360855.78,
"financial_exposure_usd": 3955353.34,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104997",
"label": "fraudulent",
"label_confidence": 0.718,
"severity": "medium",
"timestamp": "2026-01-04T11:17:00Z",
"trace_id": "97f6480b-dd96-b601-8287-40963a761212"
} | {
"account_age_days": 548,
"account_id": "ACCT-F7437B9EFAA2",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_1",
"session_entropy": 0.439
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 192,
"timestamp": "2026-01-04T11:17:00Z",
"transaction_amount_usd": 352057.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.773,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4663474.81,
"financial_exposure_usd": 6694371.17,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103303",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "low",
"timestamp": "2026-01-03T07:03:00Z",
"trace_id": "d68d1925-da04-f670-4c58-f7487dedaa0c"
} | {
"account_age_days": 1803,
"account_id": "ACCT-A177142F90D2",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_3",
"session_entropy": 0.621
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 228,
"timestamp": "2026-01-03T07:03:00Z",
"transaction_amount_usd": 83200
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.391,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 735526.63,
"financial_exposure_usd": 752982.87,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106642",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-05T14:42:00Z",
"trace_id": "2ea9eeac-1058-70c2-199e-049b97cf20c1"
} | {
"account_age_days": 1747,
"account_id": "ACCT-7A60BE1ED113",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_3",
"session_entropy": 0.736
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 150,
"timestamp": "2026-01-05T02:57:00Z",
"transaction_amount_usd": 17.53
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.471,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4753637.19,
"financial_exposure_usd": 4877136.65,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107235",
"label": "benign",
"label_confidence": 0.592,
"severity": "low",
"timestamp": "2026-01-06T00:35:00Z",
"trace_id": "883cde14-eb10-9496-818c-ba66f1474243"
} | {
"account_age_days": 484,
"account_id": "ACCT-BF29498B4347",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 148,
"timestamp": "2026-01-06T00:35:00Z",
"transaction_amount_usd": 2384.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 954.05,
"financial_exposure_usd": 1215.84,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104630",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-04T05:10:00Z",
"trace_id": "c0876204-0610-29d1-e5b9-fe3bd983b6a0"
} | {
"account_age_days": 1113,
"account_id": "ACCT-0147FB6AE9C8",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.159
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 147,
"timestamp": "2026-01-04T05:10:00Z",
"transaction_amount_usd": 1430578.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.82,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 5028815.45,
"financial_exposure_usd": 6148228.33,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100916",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "critical",
"timestamp": "2026-01-01T15:16:00Z",
"trace_id": "635b9e6b-c868-e18d-b098-0298f811744f"
} | {
"account_age_days": 1909,
"account_id": "ACCT-C3CD885F27F9",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_1",
"session_entropy": 0.388
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 152,
"timestamp": "2026-01-01T09:52:00Z",
"transaction_amount_usd": 18.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.542,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 445739.09,
"financial_exposure_usd": 888748.42,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109993",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-07T22:33:00Z",
"trace_id": "c7868fd3-9551-991d-921a-e9e05ea562a5"
} | {
"account_age_days": 1734,
"account_id": "ACCT-0EA7D7BEC015",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.537
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 318,
"timestamp": "2026-01-07T22:33:00Z",
"transaction_amount_usd": 5496.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4370.22,
"financial_exposure_usd": 5885.27,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102094",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-02T10:54:00Z",
"trace_id": "169c7c74-aacf-8fa7-0dfb-5aa2e2a2cb8d"
} | {
"account_age_days": 311,
"account_id": "ACCT-040F566FD6E6",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_3",
"session_entropy": 0.437
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 597,
"timestamp": "2026-01-02T10:54:00Z",
"transaction_amount_usd": 23873.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 659604.99,
"financial_exposure_usd": 889900.17,
"recoverable_pct": 0.152
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105914",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "high",
"timestamp": "2026-01-05T02:34:00Z",
"trace_id": "83a69bd7-0349-5e5c-b115-696214aade0b"
} | {
"account_age_days": 346,
"account_id": "ACCT-19E4F534A422",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 250,
"timestamp": "2026-01-05T02:34:00Z",
"transaction_amount_usd": 1658289.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.36,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 6800680.15,
"financial_exposure_usd": 7148593.43,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108972",
"label": "benign",
"label_confidence": 0.62,
"severity": "low",
"timestamp": "2026-01-07T05:32:00Z",
"trace_id": "d7c7b264-199a-e029-cd8c-3791d317128b"
} | {
"account_age_days": 1767,
"account_id": "ACCT-911165293E1C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.781
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 334,
"timestamp": "2026-01-07T05:32:00Z",
"transaction_amount_usd": 6541.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 5002.01,
"financial_exposure_usd": 8679.67,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104316",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "medium",
"timestamp": "2026-01-03T23:56:00Z",
"trace_id": "7ccd6157-0046-cd0e-2f63-51bf97cfc098"
} | {
"account_age_days": 792,
"account_id": "ACCT-83F03DCA7110",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.139
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 822,
"timestamp": "2026-01-03T23:56:00Z",
"transaction_amount_usd": 639153.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.401,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1913128.04,
"financial_exposure_usd": 3110641.37,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103165",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "medium",
"timestamp": "2026-01-03T04:45:00Z",
"trace_id": "d30f83f1-7b87-d46e-e880-75ea2df8c698"
} | {
"account_age_days": 486,
"account_id": "ACCT-130D2ED8D854",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 251,
"timestamp": "2026-01-03T02:45:00Z",
"transaction_amount_usd": 12.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.833,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 772732.12,
"financial_exposure_usd": 1250028.71,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105642",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-04T22:02:00Z",
"trace_id": "40715137-ac94-2370-58ee-fa6424856825"
} | {
"account_age_days": 297,
"account_id": "ACCT-2806A5922F86",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_3",
"session_entropy": 0.623
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 208,
"timestamp": "2026-01-04T10:19:00Z",
"transaction_amount_usd": 14.77
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4086750.47,
"financial_exposure_usd": 4763386.37,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107807",
"label": "benign",
"label_confidence": 0.552,
"severity": "high",
"timestamp": "2026-01-06T10:07:00Z",
"trace_id": "6e5f4b69-db16-6fe7-04ec-ba1afd28c839"
} | {
"account_age_days": 1763,
"account_id": "ACCT-FD949410DF8C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.546
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 126,
"timestamp": "2026-01-06T06:33:00Z",
"transaction_amount_usd": 4.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.519,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2517.95,
"financial_exposure_usd": 4843.75,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105873",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-05T01:53:00Z",
"trace_id": "c172e79e-e8a6-47ff-41ab-f4528fa92b2d"
} | {
"account_age_days": 1259,
"account_id": "ACCT-69D1A95E0EDF",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_1",
"session_entropy": 0.155
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 846,
"timestamp": "2026-01-05T01:53:00Z",
"transaction_amount_usd": 1226590.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.647,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2275989.66,
"financial_exposure_usd": 3283262.41,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104038",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "critical",
"timestamp": "2026-01-03T19:18:00Z",
"trace_id": "5c5164a4-74ea-3742-688d-fb5614af68e5"
} | {
"account_age_days": 984,
"account_id": "ACCT-562B81CA2E6C",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.13
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 514,
"timestamp": "2026-01-03T19:18:00Z",
"transaction_amount_usd": 925759.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.546,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2703442.02,
"financial_exposure_usd": 3701808.73,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109513",
"label": "benign",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-07T14:33:00Z",
"trace_id": "7fa0c54a-66f5-114c-f04b-d2d9fe453d30"
} | {
"account_age_days": 1549,
"account_id": "ACCT-00F850846723",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.213
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 746,
"timestamp": "2026-01-07T14:33:00Z",
"transaction_amount_usd": 3209
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6185.51,
"financial_exposure_usd": 6328.13,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100132",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "critical",
"timestamp": "2026-01-01T02:12:00Z",
"trace_id": "14d49d3a-cb40-fcdd-9cd2-da08bd3c83c3"
} | {
"account_age_days": 1510,
"account_id": "ACCT-E900B66F6083",
"baseline_risk_score": 0.557,
"kyc_tier": "tier_3",
"session_entropy": 0.71
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 681,
"timestamp": "2026-01-01T02:12:00Z",
"transaction_amount_usd": 111812.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.742,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 375283.05,
"financial_exposure_usd": 424015.83,
"recoverable_pct": 0.19
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108124",
"label": "benign",
"label_confidence": 0.577,
"severity": "critical",
"timestamp": "2026-01-06T15:24:00Z",
"trace_id": "8ceb3910-31f5-1524-fd69-d6f992b351b3"
} | {
"account_age_days": 808,
"account_id": "ACCT-B460E71A7401",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.946
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 210,
"timestamp": "2026-01-06T13:05:00Z",
"transaction_amount_usd": 15.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1684.76,
"financial_exposure_usd": 3713.52,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108101",
"label": "benign",
"label_confidence": 0.525,
"severity": "high",
"timestamp": "2026-01-06T15:01:00Z",
"trace_id": "e1e5f0d3-52e3-c3da-d0c2-53e431f7d1ea"
} | {
"account_age_days": 1930,
"account_id": "ACCT-9AFE089E2FE6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.803
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 294,
"timestamp": "2026-01-06T12:16:00Z",
"transaction_amount_usd": 12.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1858.87,
"financial_exposure_usd": 2343.15,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100460",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "critical",
"timestamp": "2026-01-01T07:40:00Z",
"trace_id": "a62be74f-8a80-4fd5-fa7a-07d7e806abcc"
} | {
"account_age_days": 770,
"account_id": "ACCT-0FE3BED52650",
"baseline_risk_score": 0.475,
"kyc_tier": "tier_2",
"session_entropy": 0.58
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 802,
"timestamp": "2026-01-01T07:40:00Z",
"transaction_amount_usd": 76062.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.59,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 756897.54,
"financial_exposure_usd": 876084.09,
"recoverable_pct": 0.032
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105521",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "medium",
"timestamp": "2026-01-04T20:01:00Z",
"trace_id": "c0358383-4aa0-7065-1ef2-76e04d5ff2d5"
} | {
"account_age_days": 496,
"account_id": "ACCT-E34A59D39F4E",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.786
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 376,
"timestamp": "2026-01-04T16:16:00Z",
"transaction_amount_usd": 4.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.566,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2159229.18,
"financial_exposure_usd": 5375053.69,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105529",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-04T20:09:00Z",
"trace_id": "f90da151-7249-c555-5c06-ee4c8eeab6fb"
} | {
"account_age_days": 1795,
"account_id": "ACCT-82C8ABF22285",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_2",
"session_entropy": 0.121
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1191,
"timestamp": "2026-01-04T20:09:00Z",
"transaction_amount_usd": 422250.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3537005.8,
"financial_exposure_usd": 7551465.29,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108161",
"label": "benign",
"label_confidence": 0.718,
"severity": "high",
"timestamp": "2026-01-06T16:01:00Z",
"trace_id": "af0de27e-002d-3c6e-e2b4-bed3d9759da9"
} | {
"account_age_days": 1463,
"account_id": "ACCT-2F834EB22071",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.682
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 628,
"timestamp": "2026-01-06T16:01:00Z",
"transaction_amount_usd": 13248.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1833.16,
"financial_exposure_usd": 2977.64,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100354",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-01T05:54:00Z",
"trace_id": "818edbdf-b4c0-b8de-e9f5-02a099472966"
} | {
"account_age_days": 678,
"account_id": "ACCT-A62060B98BC9",
"baseline_risk_score": 0.636,
"kyc_tier": "tier_3",
"session_entropy": 0.511
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 186,
"timestamp": "2025-12-31T22:19:00Z",
"transaction_amount_usd": 21.67
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.934,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 517317.84,
"financial_exposure_usd": 1174559.75,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103481",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "low",
"timestamp": "2026-01-03T10:01:00Z",
"trace_id": "b4bdc22f-88d1-f55c-43fa-80923cf31a10"
} | {
"account_age_days": 897,
"account_id": "ACCT-8AF7603736D0",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_2",
"session_entropy": 0.854
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 899,
"timestamp": "2026-01-03T10:01:00Z",
"transaction_amount_usd": 1530920.15
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.381,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 932280.28,
"financial_exposure_usd": 1444731.3,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101653",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-02T03:33:00Z",
"trace_id": "4f8171d1-3c79-ecf1-dcf9-600b622130b1"
} | {
"account_age_days": 69,
"account_id": "ACCT-38834E8358CA",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_1",
"session_entropy": 0.758
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 419,
"timestamp": "2026-01-02T03:33:00Z",
"transaction_amount_usd": 41604.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.397,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 451782.18,
"financial_exposure_usd": 585827.93,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104969",
"label": "fraudulent",
"label_confidence": 0.697,
"severity": "high",
"timestamp": "2026-01-04T10:49:00Z",
"trace_id": "a9e24eba-d5b1-a2f4-d688-012e21d79679"
} | {
"account_age_days": 661,
"account_id": "ACCT-FF7BD9A14AFB",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_1",
"session_entropy": 0.911
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 137,
"timestamp": "2026-01-04T09:09:00Z",
"transaction_amount_usd": 24.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.864,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2662633.75,
"financial_exposure_usd": 6256747.3,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101542",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "critical",
"timestamp": "2026-01-02T01:42:00Z",
"trace_id": "722b50ee-89f5-1b7d-968f-f2f9f8806658"
} | {
"account_age_days": 182,
"account_id": "ACCT-E9F027233C34",
"baseline_risk_score": 0.478,
"kyc_tier": "tier_1",
"session_entropy": 0.282
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 88,
"timestamp": "2026-01-02T01:42:00Z",
"transaction_amount_usd": 45976.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.363,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 336340.81,
"financial_exposure_usd": 681419.54,
"recoverable_pct": 0.308
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106628",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-05T14:28:00Z",
"trace_id": "c0fc051b-1453-8122-320b-63e4c42c31d0"
} | {
"account_age_days": 1760,
"account_id": "ACCT-693DD8C60C34",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_2",
"session_entropy": 0.683
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 173,
"timestamp": "2026-01-05T14:28:00Z",
"transaction_amount_usd": 873362.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3218430.38,
"financial_exposure_usd": 3459217.06,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106544",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-05T13:04:00Z",
"trace_id": "ca17e7a7-e63a-7e15-db4c-d3bdde6e51ba"
} | {
"account_age_days": 160,
"account_id": "ACCT-9CA97C6C481D",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_3",
"session_entropy": 0.664
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 934,
"timestamp": "2026-01-05T13:04:00Z",
"transaction_amount_usd": 2867143.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.709,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3711631.28,
"financial_exposure_usd": 4961457.14,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107659",
"label": "benign",
"label_confidence": 0.49,
"severity": "high",
"timestamp": "2026-01-06T07:39:00Z",
"trace_id": "b93b2051-4da7-f9dc-4145-036367f380a0"
} | {
"account_age_days": 921,
"account_id": "ACCT-78A1B0204C22",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 925,
"timestamp": "2026-01-06T07:39:00Z",
"transaction_amount_usd": 10281.47
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4893.62,
"financial_exposure_usd": 7113.75,
"recoverable_pct": 0.937
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107446",
"label": "benign",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-06T04:06:00Z",
"trace_id": "b475a5f6-e25a-f3c5-2286-4c65a0801d07"
} | {
"account_age_days": 1881,
"account_id": "ACCT-6CF965DFFEFA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.298
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1052,
"timestamp": "2026-01-06T04:06:00Z",
"transaction_amount_usd": 6989.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 293.77,
"financial_exposure_usd": 293.96,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105843",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "critical",
"timestamp": "2026-01-05T01:23:00Z",
"trace_id": "798edba8-1853-8013-49b1-c47b1192d3d7"
} | {
"account_age_days": 1151,
"account_id": "ACCT-1A6A4571470D",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_3",
"session_entropy": 0.591
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 103,
"timestamp": "2026-01-04T21:10:00Z",
"transaction_amount_usd": 24.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1136455.17,
"financial_exposure_usd": 1546142.84,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109432",
"label": "benign",
"label_confidence": 0.547,
"severity": "low",
"timestamp": "2026-01-07T13:12:00Z",
"trace_id": "0d47ebd5-b7b4-f210-3e97-87a91317954f"
} | {
"account_age_days": 1333,
"account_id": "ACCT-8B1A828FC844",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_1",
"session_entropy": 0.568
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 368,
"timestamp": "2026-01-07T13:12:00Z",
"transaction_amount_usd": 6627.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1647.23,
"financial_exposure_usd": 2080.96,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104212",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-03T22:12:00Z",
"trace_id": "b965a12b-ecb0-f589-539e-0e3901cdfddf"
} | {
"account_age_days": 1675,
"account_id": "ACCT-12120CE075DA",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_1",
"session_entropy": 0.849
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 216,
"timestamp": "2026-01-03T22:12:00Z",
"transaction_amount_usd": 1218421.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.553,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1902522.36,
"financial_exposure_usd": 2287608.13,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.