schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101702",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-02T04:22:00Z",
"trace_id": "e3c6cf19-9d7e-2bb6-806b-82cb54cb82c0"
} | {
"account_age_days": 1453,
"account_id": "ACCT-7F80F4280B18",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_3",
"session_entropy": 0.257
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 656,
"timestamp": "2026-01-02T04:22:00Z",
"transaction_amount_usd": 100857.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 236305.29,
"financial_exposure_usd": 540597.91,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106032",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "low",
"timestamp": "2026-01-05T04:32:00Z",
"trace_id": "f55bc74b-ee84-fe62-f216-c9898a797b9c"
} | {
"account_age_days": 176,
"account_id": "ACCT-5F1749860616",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 96,
"timestamp": "2026-01-05T04:32:00Z",
"transaction_amount_usd": 276154.78
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.466,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2422829.92,
"financial_exposure_usd": 2660100.9,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103242",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "critical",
"timestamp": "2026-01-03T06:02:00Z",
"trace_id": "6e387c49-ccb6-3b13-e978-b9a8eb33dd01"
} | {
"account_age_days": 288,
"account_id": "ACCT-6C389A55593A",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_2",
"session_entropy": 0.436
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 112,
"timestamp": "2026-01-02T22:05:00Z",
"transaction_amount_usd": 11.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.777,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 516620.59,
"financial_exposure_usd": 532161.22,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103359",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-03T07:59:00Z",
"trace_id": "441b57a2-8d94-8375-a224-8346b2d3b2cc"
} | {
"account_age_days": 1932,
"account_id": "ACCT-CF783348A948",
"baseline_risk_score": 0.359,
"kyc_tier": "tier_2",
"session_entropy": 0.484
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 219,
"timestamp": "2026-01-03T07:59:00Z",
"transaction_amount_usd": 1474858.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1596266.69,
"financial_exposure_usd": 2941185.09,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106724",
"label": "benign",
"label_confidence": 0.586,
"severity": "medium",
"timestamp": "2026-01-05T16:04:00Z",
"trace_id": "c6a87a78-b043-aaa3-8c35-e539f506ed05"
} | {
"account_age_days": 31,
"account_id": "ACCT-87C8F154E249",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.737
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 194,
"timestamp": "2026-01-05T10:49:00Z",
"transaction_amount_usd": 1.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4981.59,
"financial_exposure_usd": 6126.8,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103391",
"label": "fraudulent",
"label_confidence": 0.648,
"severity": "critical",
"timestamp": "2026-01-03T08:31:00Z",
"trace_id": "b56b478e-30da-e686-68da-6ad54c661596"
} | {
"account_age_days": 1077,
"account_id": "ACCT-F15B64D8E020",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.303
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 236,
"timestamp": "2026-01-03T04:13:00Z",
"transaction_amount_usd": 14.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3597362.98,
"financial_exposure_usd": 4349017.8,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102333",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "critical",
"timestamp": "2026-01-02T14:53:00Z",
"trace_id": "adf17931-6959-b289-4776-ff9dc2ca7975"
} | {
"account_age_days": 241,
"account_id": "ACCT-C0B811A247BA",
"baseline_risk_score": 0.592,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 287,
"timestamp": "2026-01-02T02:27:00Z",
"transaction_amount_usd": 10.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 886380.12,
"financial_exposure_usd": 952747.33,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104567",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-04T04:07:00Z",
"trace_id": "08e9b900-8b45-5a83-e3d3-b519091a108e"
} | {
"account_age_days": 1581,
"account_id": "ACCT-8E94A9063752",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_3",
"session_entropy": 0.647
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 312,
"timestamp": "2026-01-04T04:07:00Z",
"transaction_amount_usd": 2420197.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.73,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5114024.28,
"financial_exposure_usd": 6371415.29,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101999",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-02T09:19:00Z",
"trace_id": "44c769c0-d753-c497-a969-c769e3ef9a8e"
} | {
"account_age_days": 163,
"account_id": "ACCT-99459CE42819",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_3",
"session_entropy": 0.881
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 976,
"timestamp": "2026-01-02T09:19:00Z",
"transaction_amount_usd": 55000.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.603,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 319470.3,
"financial_exposure_usd": 393931.34,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101369",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-01T22:49:00Z",
"trace_id": "5b794ff0-b889-14ed-d9e5-32c3b9cfceb5"
} | {
"account_age_days": 1015,
"account_id": "ACCT-E7BF8A2616FA",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_3",
"session_entropy": 0.144
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1167,
"timestamp": "2026-01-01T22:49:00Z",
"transaction_amount_usd": 22173.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.865,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 747691.24,
"financial_exposure_usd": 1106918.86,
"recoverable_pct": 0.033
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103524",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "medium",
"timestamp": "2026-01-03T10:44:00Z",
"trace_id": "cea7f79a-6635-ed9c-cc1e-018de50ea71b"
} | {
"account_age_days": 1477,
"account_id": "ACCT-10967A69A022",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_3",
"session_entropy": 0.196
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 215,
"timestamp": "2026-01-03T09:56:00Z",
"transaction_amount_usd": 17.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.524,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2853466.54,
"financial_exposure_usd": 3715339.87,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104269",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "low",
"timestamp": "2026-01-03T23:09:00Z",
"trace_id": "00418ede-b91f-3c11-a8c7-bd92b9e2e24f"
} | {
"account_age_days": 236,
"account_id": "ACCT-0322A599BCE5",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.849
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 317,
"timestamp": "2026-01-03T23:09:00Z",
"transaction_amount_usd": 2081185.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2406430.84,
"financial_exposure_usd": 3926000.22,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106073",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "medium",
"timestamp": "2026-01-05T05:13:00Z",
"trace_id": "0fc7cc81-7f8b-8761-2113-7f5cba660617"
} | {
"account_age_days": 946,
"account_id": "ACCT-262116362437",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_3",
"session_entropy": 0.751
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 590,
"timestamp": "2026-01-05T05:13:00Z",
"transaction_amount_usd": 1462195.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.628,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3239843.33,
"financial_exposure_usd": 4178991.34,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101866",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "critical",
"timestamp": "2026-01-02T07:06:00Z",
"trace_id": "49244109-7827-82a6-02f3-e5c112b764b7"
} | {
"account_age_days": 1660,
"account_id": "ACCT-065B2B4D695D",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_1",
"session_entropy": 0.889
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 387,
"timestamp": "2026-01-01T23:58:00Z",
"transaction_amount_usd": 17.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.717,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 320271.1,
"financial_exposure_usd": 449010.32,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101327",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "medium",
"timestamp": "2026-01-01T22:07:00Z",
"trace_id": "9bd671f8-39ed-9320-bb5c-b15fdc775591"
} | {
"account_age_days": 856,
"account_id": "ACCT-F84F75CDA040",
"baseline_risk_score": 0.56,
"kyc_tier": "tier_1",
"session_entropy": 0.753
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 279,
"timestamp": "2026-01-01T20:50:00Z",
"transaction_amount_usd": 22.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.546,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 477322.28,
"financial_exposure_usd": 534909.65,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108836",
"label": "benign",
"label_confidence": 0.652,
"severity": "medium",
"timestamp": "2026-01-07T03:16:00Z",
"trace_id": "caea14d8-4b20-072c-63d2-098d822bb39c"
} | {
"account_age_days": 1329,
"account_id": "ACCT-E32FB29A11B8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.553
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1200,
"timestamp": "2026-01-07T03:16:00Z",
"transaction_amount_usd": 6912.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.488,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2748.51,
"financial_exposure_usd": 6462.27,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109923",
"label": "benign",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-07T21:23:00Z",
"trace_id": "01c738bb-4011-bf56-dcb6-da3c78d1405e"
} | {
"account_age_days": 247,
"account_id": "ACCT-1943A318E432",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_3",
"session_entropy": 0.896
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 82,
"timestamp": "2026-01-07T15:35:00Z",
"transaction_amount_usd": 6.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4863.85,
"financial_exposure_usd": 6464.07,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104653",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-04T05:33:00Z",
"trace_id": "40bb6dcd-4978-6926-57d0-020d5c66fae5"
} | {
"account_age_days": 664,
"account_id": "ACCT-B13946C52D6E",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.802
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 331,
"timestamp": "2026-01-03T20:55:00Z",
"transaction_amount_usd": 12.41
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.599,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3690918.5,
"financial_exposure_usd": 4106091.13,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107682",
"label": "benign",
"label_confidence": 0.455,
"severity": "low",
"timestamp": "2026-01-06T08:02:00Z",
"trace_id": "fd075187-f469-0edf-c8fe-8fcbadc81f8a"
} | {
"account_age_days": 1172,
"account_id": "ACCT-09DD4142DF04",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_3",
"session_entropy": 0.894
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 809,
"timestamp": "2026-01-06T08:02:00Z",
"transaction_amount_usd": 6998.48
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5275.13,
"financial_exposure_usd": 6447.69,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102782",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "critical",
"timestamp": "2026-01-02T22:22:00Z",
"trace_id": "255d9a5b-e7c5-039e-e40d-179bb617b31d"
} | {
"account_age_days": 306,
"account_id": "ACCT-94841576F539",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.885
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1085,
"timestamp": "2026-01-02T22:22:00Z",
"transaction_amount_usd": 67012.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.539,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 946523.32,
"financial_exposure_usd": 1182569.3,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103889",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "medium",
"timestamp": "2026-01-03T16:49:00Z",
"trace_id": "2fdb4233-7f47-6a74-70f3-917b30771556"
} | {
"account_age_days": 1947,
"account_id": "ACCT-071E4E0B4F10",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_3",
"session_entropy": 0.704
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 559,
"timestamp": "2026-01-03T16:49:00Z",
"transaction_amount_usd": 2650867
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.935,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3272177.44,
"financial_exposure_usd": 4697681.07,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103319",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-03T07:19:00Z",
"trace_id": "91e78832-9fec-8479-807b-565741844017"
} | {
"account_age_days": 1847,
"account_id": "ACCT-DED04AB62459",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_3",
"session_entropy": 0.436
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 322,
"timestamp": "2026-01-03T07:19:00Z",
"transaction_amount_usd": 55076.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.767,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 550924.44,
"financial_exposure_usd": 557003.38,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101732",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "critical",
"timestamp": "2026-01-02T04:52:00Z",
"trace_id": "ebf1276b-827e-f71e-036f-b2d699101fd2"
} | {
"account_age_days": 1365,
"account_id": "ACCT-58162C54AB6A",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_3",
"session_entropy": 0.348
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 984,
"timestamp": "2026-01-02T04:52:00Z",
"transaction_amount_usd": 70443.47
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.699,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 967737.55,
"financial_exposure_usd": 1086199.32,
"recoverable_pct": 0.382
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102882",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-03T00:02:00Z",
"trace_id": "e6257f81-e138-b203-1b1c-3963bf0df877"
} | {
"account_age_days": 1391,
"account_id": "ACCT-CF39331442E7",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.456
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 389,
"timestamp": "2026-01-02T14:15:00Z",
"transaction_amount_usd": 23.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 728295.01,
"financial_exposure_usd": 764950.28,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108485",
"label": "benign",
"label_confidence": 0.474,
"severity": "low",
"timestamp": "2026-01-06T21:25:00Z",
"trace_id": "fd340b87-baf5-1531-bf32-b75dd2912e96"
} | {
"account_age_days": 91,
"account_id": "ACCT-76DDD6ED856E",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_3",
"session_entropy": 0.531
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 80,
"timestamp": "2026-01-06T19:34:00Z",
"transaction_amount_usd": 22.75
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.799,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3074.7,
"financial_exposure_usd": 4237.66,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104492",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-04T02:52:00Z",
"trace_id": "7b386999-916a-33b8-577f-d1d364c2dde1"
} | {
"account_age_days": 1794,
"account_id": "ACCT-913D5BBE2A88",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_3",
"session_entropy": 0.86
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 311,
"timestamp": "2026-01-03T15:49:00Z",
"transaction_amount_usd": 14.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.669,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4410471.84,
"financial_exposure_usd": 6978368.45,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107947",
"label": "benign",
"label_confidence": 0.496,
"severity": "low",
"timestamp": "2026-01-06T12:27:00Z",
"trace_id": "0ae4a912-c1c8-e112-3e84-4cd080f700ec"
} | {
"account_age_days": 1513,
"account_id": "ACCT-37190F76F3D3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.397
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 178,
"timestamp": "2026-01-06T01:07:00Z",
"transaction_amount_usd": 20.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1211.91,
"financial_exposure_usd": 1548.58,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105971",
"label": "fraudulent",
"label_confidence": 0.646,
"severity": "high",
"timestamp": "2026-01-05T03:31:00Z",
"trace_id": "06de126b-7053-3efc-8c60-dfb9f752b62c"
} | {
"account_age_days": 1778,
"account_id": "ACCT-16B9A4722C7A",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_3",
"session_entropy": 0.496
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 390,
"timestamp": "2026-01-04T20:32:00Z",
"transaction_amount_usd": 16.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.697,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2907259.3,
"financial_exposure_usd": 4156405.6,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100641",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-01T10:41:00Z",
"trace_id": "ee90112f-abf4-19aa-2777-205378efb790"
} | {
"account_age_days": 1952,
"account_id": "ACCT-5CC4F5231C59",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.235
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 177,
"timestamp": "2026-01-01T10:41:00Z",
"transaction_amount_usd": 78241.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.723,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 453102.44,
"financial_exposure_usd": 875108.07,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102664",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-02T20:24:00Z",
"trace_id": "4cc4660b-af35-d7bb-5795-d2a295d5b062"
} | {
"account_age_days": 449,
"account_id": "ACCT-457C84150CA2",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_2",
"session_entropy": 0.328
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 397,
"timestamp": "2026-01-02T20:24:00Z",
"transaction_amount_usd": 58071.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.521,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 507142.2,
"financial_exposure_usd": 1228020.63,
"recoverable_pct": 0.381
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104974",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "high",
"timestamp": "2026-01-04T10:54:00Z",
"trace_id": "902e5d31-fa00-1efb-4857-be5c8fd295ac"
} | {
"account_age_days": 1592,
"account_id": "ACCT-374A91B6ADF1",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_2",
"session_entropy": 0.574
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 479,
"timestamp": "2026-01-04T10:54:00Z",
"transaction_amount_usd": 480537.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.594,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 610600.01,
"financial_exposure_usd": 1027531.16,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108534",
"label": "benign",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-06T22:14:00Z",
"trace_id": "d8e879ef-0abd-bae6-623b-3710aeb33342"
} | {
"account_age_days": 1757,
"account_id": "ACCT-356E45887050",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.731
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 157,
"timestamp": "2026-01-06T09:44:00Z",
"transaction_amount_usd": 9.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1808.48,
"financial_exposure_usd": 2384.52,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104570",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "critical",
"timestamp": "2026-01-04T04:10:00Z",
"trace_id": "0d2b9b30-da2d-6da8-b9f5-2f48d499deb3"
} | {
"account_age_days": 1956,
"account_id": "ACCT-33622B789ED6",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_1",
"session_entropy": 0.464
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 310,
"timestamp": "2026-01-03T15:47:00Z",
"transaction_amount_usd": 3.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.818,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3119552.09,
"financial_exposure_usd": 3324224.56,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101611",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-02T02:51:00Z",
"trace_id": "f81b56b1-103b-54de-d6b7-a3ecaf6bacfe"
} | {
"account_age_days": 1998,
"account_id": "ACCT-C06F4BCBDB2C",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_3",
"session_entropy": 0.301
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 817,
"timestamp": "2026-01-02T02:51:00Z",
"transaction_amount_usd": 54039.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.72,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 126077.08,
"financial_exposure_usd": 303562.19,
"recoverable_pct": 0.163
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104673",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-04T05:53:00Z",
"trace_id": "715d92b7-75db-100c-43f1-bd5b6cd33956"
} | {
"account_age_days": 1457,
"account_id": "ACCT-4085993661A8",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_1",
"session_entropy": 0.496
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 347,
"timestamp": "2026-01-04T05:53:00Z",
"transaction_amount_usd": 138025.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.65,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2555264.47,
"financial_exposure_usd": 3649495.66,
"recoverable_pct": 0.597
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105141",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "medium",
"timestamp": "2026-01-04T13:41:00Z",
"trace_id": "c40003b4-4317-63d6-118d-0cb93e123ced"
} | {
"account_age_days": 1170,
"account_id": "ACCT-677BC7224085",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_3",
"session_entropy": 0.429
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1005,
"timestamp": "2026-01-04T13:41:00Z",
"transaction_amount_usd": 1583906.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.948,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4505741.46,
"financial_exposure_usd": 4524658.18,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100130",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-01T02:10:00Z",
"trace_id": "5c85a58c-d029-0d6b-ebe5-5cc408d57cf7"
} | {
"account_age_days": 408,
"account_id": "ACCT-2FB7E9BD5FE9",
"baseline_risk_score": 0.512,
"kyc_tier": "tier_2",
"session_entropy": 0.698
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1012,
"timestamp": "2026-01-01T02:10:00Z",
"transaction_amount_usd": 3876.6
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.652,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 450104.38,
"financial_exposure_usd": 671400.28,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103709",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-03T13:49:00Z",
"trace_id": "2e78550b-1f09-bf41-ab97-8acce882dc2f"
} | {
"account_age_days": 1093,
"account_id": "ACCT-F4336D89BDC3",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_2",
"session_entropy": 0.931
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 989,
"timestamp": "2026-01-03T13:49:00Z",
"transaction_amount_usd": 705555.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3724172.91,
"financial_exposure_usd": 5084551.85,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107432",
"label": "benign",
"label_confidence": 0.464,
"severity": "low",
"timestamp": "2026-01-06T03:52:00Z",
"trace_id": "4dc083ea-6a8f-cd4b-76d7-fb3f15382f9b"
} | {
"account_age_days": 648,
"account_id": "ACCT-887F97041A85",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_3",
"session_entropy": 0.715
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 255,
"timestamp": "2026-01-05T16:28:00Z",
"transaction_amount_usd": 13.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.588,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4849.99,
"financial_exposure_usd": 7599.92,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100165",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-01T02:45:00Z",
"trace_id": "a7bbc612-9a37-ef9d-5983-ce94506a8dd3"
} | {
"account_age_days": 789,
"account_id": "ACCT-47729ADF0F49",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_2",
"session_entropy": 0.826
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 237,
"timestamp": "2026-01-01T02:45:00Z",
"transaction_amount_usd": 16001.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 455761.93,
"financial_exposure_usd": 683904.31,
"recoverable_pct": 0.191
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102985",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-03T01:45:00Z",
"trace_id": "9c203e41-2b3a-567b-0a5d-fe1ceaac085f"
} | {
"account_age_days": 273,
"account_id": "ACCT-4E15BF558A37",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.942
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1035,
"timestamp": "2026-01-03T01:45:00Z",
"transaction_amount_usd": 39028.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.781,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 858606.25,
"financial_exposure_usd": 1007055.24,
"recoverable_pct": 0.38
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107993",
"label": "benign",
"label_confidence": 0.651,
"severity": "high",
"timestamp": "2026-01-06T13:13:00Z",
"trace_id": "ab935209-b103-a404-fe73-dc927f927eb6"
} | {
"account_age_days": 1780,
"account_id": "ACCT-1C5D8EC3E7D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.284
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 568,
"timestamp": "2026-01-06T13:13:00Z",
"transaction_amount_usd": 2139.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6369.28,
"financial_exposure_usd": 6409.59,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107599",
"label": "benign",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-06T06:39:00Z",
"trace_id": "d51dadaa-dff7-7fd9-82a9-e93807ac21d2"
} | {
"account_age_days": 1691,
"account_id": "ACCT-97842FD673D3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.915
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 304,
"timestamp": "2026-01-06T00:21:00Z",
"transaction_amount_usd": 24.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.657,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1033.84,
"financial_exposure_usd": 1316.65,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100836",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "low",
"timestamp": "2026-01-01T13:56:00Z",
"trace_id": "6ca0ce39-a252-08eb-cfd3-ca8e809afe97"
} | {
"account_age_days": 433,
"account_id": "ACCT-FEB7BB5E75BC",
"baseline_risk_score": 0.547,
"kyc_tier": "tier_1",
"session_entropy": 0.846
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 840,
"timestamp": "2026-01-01T13:56:00Z",
"transaction_amount_usd": 110467.42
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.499,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 697353.4,
"financial_exposure_usd": 890716.12,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100117",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-01T01:57:00Z",
"trace_id": "6021a15b-4207-fb51-52ff-eff5e49c5edd"
} | {
"account_age_days": 1703,
"account_id": "ACCT-6532B3AE16F7",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.694
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 338,
"timestamp": "2025-12-31T23:32:00Z",
"transaction_amount_usd": 5.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.949,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 254429.68,
"financial_exposure_usd": 483237.98,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108122",
"label": "benign",
"label_confidence": 0.463,
"severity": "medium",
"timestamp": "2026-01-06T15:22:00Z",
"trace_id": "ee298592-301e-c6af-65ad-14f3228c5995"
} | {
"account_age_days": 1465,
"account_id": "ACCT-290963371FDD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.757
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 898,
"timestamp": "2026-01-06T15:22:00Z",
"transaction_amount_usd": 7505.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3287.81,
"financial_exposure_usd": 7045.94,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109987",
"label": "benign",
"label_confidence": 0.719,
"severity": "critical",
"timestamp": "2026-01-07T22:27:00Z",
"trace_id": "2106d911-8afc-ef48-44e3-7f6c3de411e2"
} | {
"account_age_days": 719,
"account_id": "ACCT-B75B01D7297C",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_3",
"session_entropy": 0.792
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 832,
"timestamp": "2026-01-07T22:27:00Z",
"transaction_amount_usd": 7143.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 586.03,
"financial_exposure_usd": 1239.25,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102362",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "medium",
"timestamp": "2026-01-02T15:22:00Z",
"trace_id": "6a46b7bd-c5de-493c-f9b3-ff6b3e6f63e1"
} | {
"account_age_days": 354,
"account_id": "ACCT-45B0AE23ED4E",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 946,
"timestamp": "2026-01-02T15:22:00Z",
"transaction_amount_usd": 72808.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 511094.14,
"financial_exposure_usd": 529329.22,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107222",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-06T00:22:00Z",
"trace_id": "1ef5cfb7-757f-924e-8841-09f4ffc491d8"
} | {
"account_age_days": 1394,
"account_id": "ACCT-F94F6409EBCB",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_2",
"session_entropy": 0.341
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1199,
"timestamp": "2026-01-06T00:22:00Z",
"transaction_amount_usd": 4201.8
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.551,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 2",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 6242.65,
"financial_exposure_usd": 8046.2,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100382",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "medium",
"timestamp": "2026-01-01T06:22:00Z",
"trace_id": "dac72a71-ef56-cb9e-b087-e0e9db665e25"
} | {
"account_age_days": 103,
"account_id": "ACCT-D25B53F506ED",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_3",
"session_entropy": 0.907
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1029,
"timestamp": "2026-01-01T06:22:00Z",
"transaction_amount_usd": 1247.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.525,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 485930.76,
"financial_exposure_usd": 1021077.22,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106285",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "medium",
"timestamp": "2026-01-05T08:45:00Z",
"trace_id": "125c28be-49b5-6ce2-9396-5822c96c579c"
} | {
"account_age_days": 1833,
"account_id": "ACCT-A51CBC751B7F",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_1",
"session_entropy": 0.42
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 87,
"timestamp": "2026-01-05T08:45:00Z",
"transaction_amount_usd": 2743950.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.54,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3318714.95,
"financial_exposure_usd": 4810431.47,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108115",
"label": "benign",
"label_confidence": 0.502,
"severity": "low",
"timestamp": "2026-01-06T15:15:00Z",
"trace_id": "e94df5cb-cc6a-77ef-9205-9a697904dab5"
} | {
"account_age_days": 1408,
"account_id": "ACCT-ACCBBFEEF2F2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.546
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 211,
"timestamp": "2026-01-06T09:49:00Z",
"transaction_amount_usd": 23.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3501.45,
"financial_exposure_usd": 3785.53,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100122",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "high",
"timestamp": "2026-01-01T02:02:00Z",
"trace_id": "efa52c8a-56a0-4943-1c68-7714e2901d96"
} | {
"account_age_days": 1622,
"account_id": "ACCT-66A466D494C8",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_3",
"session_entropy": 0.642
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 968,
"timestamp": "2026-01-01T02:02:00Z",
"transaction_amount_usd": 29197.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.474,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 454547.84,
"financial_exposure_usd": 677168.21,
"recoverable_pct": 0.199
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106904",
"label": "benign",
"label_confidence": 0.572,
"severity": "low",
"timestamp": "2026-01-05T19:04:00Z",
"trace_id": "32f278ec-fd95-a2e5-bbb6-6559bced3628"
} | {
"account_age_days": 1332,
"account_id": "ACCT-0514E3113A6F",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_1",
"session_entropy": 0.442
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 240,
"timestamp": "2026-01-05T11:15:00Z",
"transaction_amount_usd": 9.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5687.92,
"financial_exposure_usd": 7468.77,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108121",
"label": "benign",
"label_confidence": 0.71,
"severity": "low",
"timestamp": "2026-01-06T15:21:00Z",
"trace_id": "fe5d6c99-4a95-ab26-487b-505e862d9a6d"
} | {
"account_age_days": 1326,
"account_id": "ACCT-EDE8ADFCDCC1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.405
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1014,
"timestamp": "2026-01-06T15:21:00Z",
"transaction_amount_usd": 10480.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.72,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1904.05,
"financial_exposure_usd": 4507.15,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100010",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "critical",
"timestamp": "2026-01-01T00:10:00Z",
"trace_id": "5a104129-54ae-bd1b-8ce6-424dbef59fe6"
} | {
"account_age_days": 1167,
"account_id": "ACCT-FD72B05096A9",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.465
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 354,
"timestamp": "2025-12-31T15:30:00Z",
"transaction_amount_usd": 4.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.716,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 780696.73,
"financial_exposure_usd": 806043.48,
"recoverable_pct": 0.177
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108422",
"label": "benign",
"label_confidence": 0.556,
"severity": "medium",
"timestamp": "2026-01-06T20:22:00Z",
"trace_id": "825b016e-38aa-d5de-f8f3-568642f54b40"
} | {
"account_age_days": 52,
"account_id": "ACCT-84799D23978F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.946
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 301,
"timestamp": "2026-01-06T20:22:00Z",
"transaction_amount_usd": 2831.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1246.9,
"financial_exposure_usd": 1956.15,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104494",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "critical",
"timestamp": "2026-01-04T02:54:00Z",
"trace_id": "cbf9b061-fc77-22a9-7b91-f45a1bb9c947"
} | {
"account_age_days": 1010,
"account_id": "ACCT-0862771D139B",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_2",
"session_entropy": 0.334
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 899,
"timestamp": "2026-01-04T02:54:00Z",
"transaction_amount_usd": 1400808.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.828,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2805325.19,
"financial_exposure_usd": 3359003.78,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107557",
"label": "benign",
"label_confidence": 0.617,
"severity": "high",
"timestamp": "2026-01-06T05:57:00Z",
"trace_id": "dca78502-f368-5cca-c7aa-90e402ed7839"
} | {
"account_age_days": 58,
"account_id": "ACCT-8AE611425D90",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.621
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 189,
"timestamp": "2026-01-06T05:57:00Z",
"transaction_amount_usd": 13586.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1201.3,
"financial_exposure_usd": 2384.06,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106190",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "critical",
"timestamp": "2026-01-05T07:10:00Z",
"trace_id": "8fb28f73-39c9-3eb6-e184-d958ca0b4137"
} | {
"account_age_days": 1024,
"account_id": "ACCT-D35E09F1813B",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_2",
"session_entropy": 0.902
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 492,
"timestamp": "2026-01-05T07:10:00Z",
"transaction_amount_usd": 2550271.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.486,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2215728.71,
"financial_exposure_usd": 4429688.16,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109955",
"label": "benign",
"label_confidence": 0.48,
"severity": "low",
"timestamp": "2026-01-07T21:55:00Z",
"trace_id": "023d82a3-80d9-f5ed-4a71-f42c9e451930"
} | {
"account_age_days": 1077,
"account_id": "ACCT-BF9DBC8BA756",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.39
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1142,
"timestamp": "2026-01-07T21:55:00Z",
"transaction_amount_usd": 14527.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1634.41,
"financial_exposure_usd": 2323.05,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109162",
"label": "benign",
"label_confidence": 0.672,
"severity": "low",
"timestamp": "2026-01-07T08:42:00Z",
"trace_id": "214a0644-ede3-cec3-5741-457b025ae1b5"
} | {
"account_age_days": 1178,
"account_id": "ACCT-5D6F8BEA8896",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.543
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 172,
"timestamp": "2026-01-07T08:42:00Z",
"transaction_amount_usd": 12818.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1959.55,
"financial_exposure_usd": 2138.61,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102290",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "critical",
"timestamp": "2026-01-02T14:10:00Z",
"trace_id": "796cfdce-28fc-0e6a-e8c3-d6266ec79562"
} | {
"account_age_days": 1998,
"account_id": "ACCT-42CCB990BCB8",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_1",
"session_entropy": 0.888
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 987,
"timestamp": "2026-01-02T14:10:00Z",
"transaction_amount_usd": 45781.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.845,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 477217.41,
"financial_exposure_usd": 855700.92,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108535",
"label": "benign",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-06T22:15:00Z",
"trace_id": "23053e1c-529b-85b8-d369-1451d4bcfe17"
} | {
"account_age_days": 590,
"account_id": "ACCT-308E1B0AC3A7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.862
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 287,
"timestamp": "2026-01-06T20:10:00Z",
"transaction_amount_usd": 2.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1658.86,
"financial_exposure_usd": 1665.82,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108227",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-06T17:07:00Z",
"trace_id": "ae4f75ec-0c95-f04b-4826-bbc539c0d49b"
} | {
"account_age_days": 1033,
"account_id": "ACCT-56E6934C631B",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_1",
"session_entropy": 0.835
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 322,
"timestamp": "2026-01-06T06:46:00Z",
"transaction_amount_usd": 10.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7924.52,
"financial_exposure_usd": 8416.95,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104555",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "critical",
"timestamp": "2026-01-04T03:55:00Z",
"trace_id": "198e5d6b-e172-7e37-0f9f-e457e123b2df"
} | {
"account_age_days": 43,
"account_id": "ACCT-C35665775E25",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.635
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 305,
"timestamp": "2026-01-04T03:55:00Z",
"transaction_amount_usd": 2876851.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1111355.37,
"financial_exposure_usd": 1414792.14,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103993",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "medium",
"timestamp": "2026-01-03T18:33:00Z",
"trace_id": "3e5cb5ba-f623-f9e6-5aec-bad2b40bbaf1"
} | {
"account_age_days": 1970,
"account_id": "ACCT-44B78AEFB41A",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.709
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 943,
"timestamp": "2026-01-03T18:33:00Z",
"transaction_amount_usd": 2812945.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.474,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 991956.02,
"financial_exposure_usd": 2185768,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109911",
"label": "benign",
"label_confidence": 0.503,
"severity": "high",
"timestamp": "2026-01-07T21:11:00Z",
"trace_id": "04b77b2f-5e38-b4f5-7a62-55d2ca0ab06c"
} | {
"account_age_days": 284,
"account_id": "ACCT-96DA373EA71D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.584
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 652,
"timestamp": "2026-01-07T21:11:00Z",
"transaction_amount_usd": 4910.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1178.49,
"financial_exposure_usd": 2870.19,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100071",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "high",
"timestamp": "2026-01-01T01:11:00Z",
"trace_id": "406bf02d-a97a-4f4e-3c10-871bba4f4b03"
} | {
"account_age_days": 1225,
"account_id": "ACCT-6E310234C410",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_1",
"session_entropy": 0.778
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 360,
"timestamp": "2025-12-31T22:46:00Z",
"transaction_amount_usd": 23.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.679,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 487269.89,
"financial_exposure_usd": 753073.6,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104924",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-04T10:04:00Z",
"trace_id": "2e8ceedc-38c2-a2c5-2348-64374c17910c"
} | {
"account_age_days": 1453,
"account_id": "ACCT-6DE77B7A43BE",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_3",
"session_entropy": 0.195
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 492,
"timestamp": "2026-01-04T10:04:00Z",
"transaction_amount_usd": 1300352.66
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.568,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1982978.05,
"financial_exposure_usd": 2016029.73,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109566",
"label": "benign",
"label_confidence": 0.477,
"severity": "low",
"timestamp": "2026-01-07T15:26:00Z",
"trace_id": "09bfe75d-1f49-9c2a-2a2b-2720f2e8633e"
} | {
"account_age_days": 201,
"account_id": "ACCT-2D7882894618",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 896,
"timestamp": "2026-01-07T15:26:00Z",
"transaction_amount_usd": 2720.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 620.04,
"financial_exposure_usd": 655.71,
"recoverable_pct": 0.933
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103074",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-03T03:14:00Z",
"trace_id": "5fd3aae7-1b28-1c46-44c6-befd46d685d0"
} | {
"account_age_days": 1871,
"account_id": "ACCT-019BE32660C9",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_3",
"session_entropy": 0.909
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 210,
"timestamp": "2026-01-03T03:14:00Z",
"transaction_amount_usd": 62167.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.685,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 441230.42,
"financial_exposure_usd": 832644.66,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109696",
"label": "benign",
"label_confidence": 0.684,
"severity": "low",
"timestamp": "2026-01-07T17:36:00Z",
"trace_id": "21d967b7-495c-43dc-ee92-3d7488025f6b"
} | {
"account_age_days": 1754,
"account_id": "ACCT-9738BE61E2B8",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_3",
"session_entropy": 0.38
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1036,
"timestamp": "2026-01-07T17:36:00Z",
"transaction_amount_usd": 3427.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.793,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2853.6,
"financial_exposure_usd": 5517.85,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101518",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "critical",
"timestamp": "2026-01-02T01:18:00Z",
"trace_id": "16c04a5e-4afd-aca6-f536-9f9e138f995c"
} | {
"account_age_days": 1066,
"account_id": "ACCT-CC347FFAC57F",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_3",
"session_entropy": 0.51
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 323,
"timestamp": "2026-01-01T21:55:00Z",
"transaction_amount_usd": 7.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 111659.1,
"financial_exposure_usd": 129137.5,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106291",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "high",
"timestamp": "2026-01-05T08:51:00Z",
"trace_id": "18f13c12-6446-0a42-35bc-f44fda29381e"
} | {
"account_age_days": 781,
"account_id": "ACCT-964FFDD3702F",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_3",
"session_entropy": 0.44
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 93,
"timestamp": "2026-01-05T08:51:00Z",
"transaction_amount_usd": 807391.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.725,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4443696.58,
"financial_exposure_usd": 6851547.42,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109554",
"label": "benign",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-07T15:14:00Z",
"trace_id": "f192361c-8433-ff5a-6b4b-70babb5d3c5c"
} | {
"account_age_days": 1587,
"account_id": "ACCT-8086BA2D56BD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.939
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 359,
"timestamp": "2026-01-07T05:58:00Z",
"transaction_amount_usd": 13.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 295.92,
"financial_exposure_usd": 590.49,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104230",
"label": "fraudulent",
"label_confidence": 0.74,
"severity": "low",
"timestamp": "2026-01-03T22:30:00Z",
"trace_id": "33abade2-4ad5-c323-43bf-ece09afa9564"
} | {
"account_age_days": 1987,
"account_id": "ACCT-36A9D994A3EC",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_1",
"session_entropy": 0.45
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 779,
"timestamp": "2026-01-03T22:30:00Z",
"transaction_amount_usd": 972382.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.403,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1763879.81,
"financial_exposure_usd": 3333539.85,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104227",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "medium",
"timestamp": "2026-01-03T22:27:00Z",
"trace_id": "3ec8a33e-ce3e-4d82-bdb8-4dac8b2d4c47"
} | {
"account_age_days": 302,
"account_id": "ACCT-6E5B75010BEE",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_3",
"session_entropy": 0.423
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 247,
"timestamp": "2026-01-03T18:34:00Z",
"transaction_amount_usd": 23.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.769,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3430495.87,
"financial_exposure_usd": 3625233.5,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108864",
"label": "benign",
"label_confidence": 0.576,
"severity": "low",
"timestamp": "2026-01-07T03:44:00Z",
"trace_id": "57486fd8-cc95-2a54-7a6a-6f9a001f33dc"
} | {
"account_age_days": 387,
"account_id": "ACCT-51FFD6C5619D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.479
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 323,
"timestamp": "2026-01-06T22:17:00Z",
"transaction_amount_usd": 17.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1951.5,
"financial_exposure_usd": 2320.42,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101816",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "critical",
"timestamp": "2026-01-02T06:16:00Z",
"trace_id": "10df28d0-2b5e-c7c1-10a0-72cd3b08298f"
} | {
"account_age_days": 1570,
"account_id": "ACCT-C6A55CF6FD99",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.442
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 181,
"timestamp": "2026-01-01T20:29:00Z",
"transaction_amount_usd": 15.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.57,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 841045.85,
"financial_exposure_usd": 1221808.2,
"recoverable_pct": 0.285
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107932",
"label": "benign",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-06T12:12:00Z",
"trace_id": "2e28b3ac-ec9f-7b7b-e554-a4325808dd9f"
} | {
"account_age_days": 313,
"account_id": "ACCT-473B39A7ED8D",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.171
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 305,
"timestamp": "2026-01-06T08:53:00Z",
"transaction_amount_usd": 8.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1833.73,
"financial_exposure_usd": 4360.58,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108041",
"label": "benign",
"label_confidence": 0.599,
"severity": "low",
"timestamp": "2026-01-06T14:01:00Z",
"trace_id": "41e53a7b-adb9-0f90-2f7f-86c3c420d2ff"
} | {
"account_age_days": 35,
"account_id": "ACCT-24DB1BCAEC84",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.437
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 691,
"timestamp": "2026-01-06T14:01:00Z",
"transaction_amount_usd": 11219.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1019.95,
"financial_exposure_usd": 1907.01,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109589",
"label": "benign",
"label_confidence": 0.533,
"severity": "low",
"timestamp": "2026-01-07T15:49:00Z",
"trace_id": "bb04bf6a-4819-a9d7-4d29-97d9ca2a6ee1"
} | {
"account_age_days": 595,
"account_id": "ACCT-C166E064B105",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_1",
"session_entropy": 0.365
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 813,
"timestamp": "2026-01-07T15:49:00Z",
"transaction_amount_usd": 7607.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 259.88,
"financial_exposure_usd": 345.29,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105488",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-04T19:28:00Z",
"trace_id": "560761df-37f1-6b00-e9e2-fbae5155940a"
} | {
"account_age_days": 1977,
"account_id": "ACCT-DC8FA7F9B3A6",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_3",
"session_entropy": 0.387
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1004,
"timestamp": "2026-01-04T19:28:00Z",
"transaction_amount_usd": 1226543.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.858,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3272345.04,
"financial_exposure_usd": 3971311.21,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103649",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-03T12:49:00Z",
"trace_id": "eda1f3b0-5ba2-ecf7-ff85-1b884b433ed9"
} | {
"account_age_days": 1481,
"account_id": "ACCT-2A12DC9FE7D1",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_2",
"session_entropy": 0.754
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 682,
"timestamp": "2026-01-03T12:49:00Z",
"transaction_amount_usd": 1891503.57
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.629,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1401708.15,
"financial_exposure_usd": 2747471.24,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104685",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "low",
"timestamp": "2026-01-04T06:05:00Z",
"trace_id": "f8ee429a-6ea3-c825-a49c-2ac820af9eda"
} | {
"account_age_days": 1257,
"account_id": "ACCT-A58DFF404C57",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_3",
"session_entropy": 0.933
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 791,
"timestamp": "2026-01-04T06:05:00Z",
"transaction_amount_usd": 733951.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.772,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4544457.22,
"financial_exposure_usd": 5720408.09,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105195",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "high",
"timestamp": "2026-01-04T14:35:00Z",
"trace_id": "692c7a9e-1d4a-ba49-fb4d-5ff86eb143f8"
} | {
"account_age_days": 1500,
"account_id": "ACCT-39F98561BD2F",
"baseline_risk_score": 0.216,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 395,
"timestamp": "2026-01-04T07:55:00Z",
"transaction_amount_usd": 2.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.743,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3092798.48,
"financial_exposure_usd": 6144510.65,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104589",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "high",
"timestamp": "2026-01-04T04:29:00Z",
"trace_id": "8dbcf2e8-51e5-7239-6ebb-6d3d4edb9b16"
} | {
"account_age_days": 1742,
"account_id": "ACCT-3870F914E08F",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_3",
"session_entropy": 0.6
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 117,
"timestamp": "2026-01-04T04:29:00Z",
"transaction_amount_usd": 2047265.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4177358.66,
"financial_exposure_usd": 7997557.13,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106662",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "medium",
"timestamp": "2026-01-05T15:02:00Z",
"trace_id": "1ed86db8-f93d-f6fe-4d35-3610db140161"
} | {
"account_age_days": 782,
"account_id": "ACCT-FB007D65EA28",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_1",
"session_entropy": 0.364
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 236,
"timestamp": "2026-01-05T11:02:00Z",
"transaction_amount_usd": 17.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.861,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1594389.66,
"financial_exposure_usd": 3201336.3,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105541",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-04T20:21:00Z",
"trace_id": "ed03f7ee-db37-4617-7ea5-a7268b5fd407"
} | {
"account_age_days": 1731,
"account_id": "ACCT-24FF70E5D693",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_3",
"session_entropy": 0.332
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 296,
"timestamp": "2026-01-04T20:21:00Z",
"transaction_amount_usd": 448384.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.695,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3631242.3,
"financial_exposure_usd": 4811706.65,
"recoverable_pct": 0.929
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100843",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "critical",
"timestamp": "2026-01-01T14:03:00Z",
"trace_id": "a8cd021a-31f7-ee6b-4cfe-40eb06ba1d8b"
} | {
"account_age_days": 346,
"account_id": "ACCT-F59613BFD88B",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_2",
"session_entropy": 0.593
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1054,
"timestamp": "2026-01-01T14:03:00Z",
"transaction_amount_usd": 15426.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.364,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 260228.42,
"financial_exposure_usd": 518770.58,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109091",
"label": "benign",
"label_confidence": 0.521,
"severity": "medium",
"timestamp": "2026-01-07T07:31:00Z",
"trace_id": "af41a57a-8af7-c820-a5b8-1e290d4b2d9a"
} | {
"account_age_days": 118,
"account_id": "ACCT-AA6B2E1F0EAE",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.471
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 777,
"timestamp": "2026-01-07T07:31:00Z",
"transaction_amount_usd": 9049.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 636.28,
"financial_exposure_usd": 893,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107632",
"label": "benign",
"label_confidence": 0.523,
"severity": "low",
"timestamp": "2026-01-06T07:12:00Z",
"trace_id": "52e41cc7-2b59-40aa-bfc8-7c54c08a34df"
} | {
"account_age_days": 1606,
"account_id": "ACCT-9153BE16EF24",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_3",
"session_entropy": 0.307
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 582,
"timestamp": "2026-01-06T07:12:00Z",
"transaction_amount_usd": 14425.49
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5279.28,
"financial_exposure_usd": 9404.05,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101162",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "critical",
"timestamp": "2026-01-01T19:22:00Z",
"trace_id": "6c9a0616-5c86-c048-365f-6c6da0e3c3d8"
} | {
"account_age_days": 632,
"account_id": "ACCT-A4155DA70787",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 92,
"timestamp": "2026-01-01T19:22:00Z",
"transaction_amount_usd": 71294.48
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.559,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 669627.18,
"financial_exposure_usd": 784406.27,
"recoverable_pct": 0.008
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104996",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "medium",
"timestamp": "2026-01-04T11:16:00Z",
"trace_id": "867d5693-0580-aad2-f326-1626db1e8692"
} | {
"account_age_days": 302,
"account_id": "ACCT-CEED2D162E7A",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_3",
"session_entropy": 0.799
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 499,
"timestamp": "2026-01-04T11:16:00Z",
"transaction_amount_usd": 2326303.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.359,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1885737.61,
"financial_exposure_usd": 3098110.59,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107055",
"label": "benign",
"label_confidence": 0.536,
"severity": "medium",
"timestamp": "2026-01-05T21:35:00Z",
"trace_id": "40f856ca-88a6-a38e-493f-ed25129c21f2"
} | {
"account_age_days": 1933,
"account_id": "ACCT-1C435985E31B",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_2",
"session_entropy": 0.686
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 800,
"timestamp": "2026-01-05T21:35:00Z",
"transaction_amount_usd": 10475.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1213.37,
"financial_exposure_usd": 1679.28,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107642",
"label": "benign",
"label_confidence": 0.61,
"severity": "high",
"timestamp": "2026-01-06T07:22:00Z",
"trace_id": "cb70a50e-3439-7017-2847-38f69b2ceeb5"
} | {
"account_age_days": 1353,
"account_id": "ACCT-54D92683B6FF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.511
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 309,
"timestamp": "2026-01-05T20:46:00Z",
"transaction_amount_usd": 0.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.597,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4786.47,
"financial_exposure_usd": 7082.88,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109271",
"label": "benign",
"label_confidence": 0.731,
"severity": "low",
"timestamp": "2026-01-07T10:31:00Z",
"trace_id": "268e4028-042d-e039-7977-e9bfb9a204ac"
} | {
"account_age_days": 557,
"account_id": "ACCT-662C71751281",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.296
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1145,
"timestamp": "2026-01-07T10:31:00Z",
"transaction_amount_usd": 6466.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.563,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5407.22,
"financial_exposure_usd": 8611.38,
"recoverable_pct": 0.712
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107814",
"label": "benign",
"label_confidence": 0.71,
"severity": "low",
"timestamp": "2026-01-06T10:14:00Z",
"trace_id": "c61ebe4e-2061-8409-aa5d-9cc5095bede7"
} | {
"account_age_days": 1733,
"account_id": "ACCT-948B6A3C9C7B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.673
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 267,
"timestamp": "2026-01-06T01:34:00Z",
"transaction_amount_usd": 0.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4279.4,
"financial_exposure_usd": 6526.34,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106007",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "high",
"timestamp": "2026-01-05T04:07:00Z",
"trace_id": "d85d7f59-04af-db7d-caff-0085a148889a"
} | {
"account_age_days": 1906,
"account_id": "ACCT-89D5BCBBA2C2",
"baseline_risk_score": 0.369,
"kyc_tier": "tier_3",
"session_entropy": 0.429
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 247,
"timestamp": "2026-01-05T04:07:00Z",
"transaction_amount_usd": 2300895.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.496,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1241190.85,
"financial_exposure_usd": 1854546.13,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.