schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106680",
"label": "benign",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-05T15:20:00Z",
"trace_id": "f84ba89a-3326-2813-e59e-5030b7ec62c9"
} | {
"account_age_days": 1191,
"account_id": "ACCT-D732A52991E7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.173
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1016,
"timestamp": "2026-01-05T15:20:00Z",
"transaction_amount_usd": 12049.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2267.65,
"financial_exposure_usd": 3617.72,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102390",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "critical",
"timestamp": "2026-01-02T15:50:00Z",
"trace_id": "e81add13-a6a0-9d72-1532-5da6cf95636f"
} | {
"account_age_days": 1161,
"account_id": "ACCT-E2AB4FE12D60",
"baseline_risk_score": 0.59,
"kyc_tier": "tier_2",
"session_entropy": 0.829
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 106,
"timestamp": "2026-01-02T04:32:00Z",
"transaction_amount_usd": 17.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.822,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 519152.12,
"financial_exposure_usd": 548383.57,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105535",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "critical",
"timestamp": "2026-01-04T20:15:00Z",
"trace_id": "28a0553e-922b-05b2-d16e-9182d88d69b9"
} | {
"account_age_days": 224,
"account_id": "ACCT-DDBD431636D6",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.607
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1172,
"timestamp": "2026-01-04T20:15:00Z",
"transaction_amount_usd": 1357793.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.371,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2638103.6,
"financial_exposure_usd": 3002467.21,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102565",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "medium",
"timestamp": "2026-01-02T18:45:00Z",
"trace_id": "602c8a73-56af-3beb-64af-bf9e817f89a3"
} | {
"account_age_days": 1181,
"account_id": "ACCT-00BB00127F06",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_3",
"session_entropy": 0.151
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 154,
"timestamp": "2026-01-02T18:45:00Z",
"transaction_amount_usd": 78361.35
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.572,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 706654.91,
"financial_exposure_usd": 804791.49,
"recoverable_pct": 0.152
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103275",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "critical",
"timestamp": "2026-01-03T06:35:00Z",
"trace_id": "01df024b-5fd8-969c-8cdb-d0252809f027"
} | {
"account_age_days": 864,
"account_id": "ACCT-CC2C5E012EDD",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_2",
"session_entropy": 0.35
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 275,
"timestamp": "2026-01-02T19:55:00Z",
"transaction_amount_usd": 0.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.77,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 301306.12,
"financial_exposure_usd": 528005.3,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105201",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "low",
"timestamp": "2026-01-04T14:41:00Z",
"trace_id": "f1af9274-5a1c-5f78-d9f0-c6e7e6f4592f"
} | {
"account_age_days": 1773,
"account_id": "ACCT-B528EE6A4696",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_2",
"session_entropy": 0.492
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 272,
"timestamp": "2026-01-04T13:16:00Z",
"transaction_amount_usd": 19.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.714,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1199836.4,
"financial_exposure_usd": 1685435.18,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108893",
"label": "benign",
"label_confidence": 0.479,
"severity": "critical",
"timestamp": "2026-01-07T04:13:00Z",
"trace_id": "6e5de5a5-b9a7-9697-01cd-fdedf9eb7a72"
} | {
"account_age_days": 568,
"account_id": "ACCT-AA8BF411267E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.344
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 170,
"timestamp": "2026-01-07T01:48:00Z",
"transaction_amount_usd": 13.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.456,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2289.25,
"financial_exposure_usd": 3934.6,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107638",
"label": "benign",
"label_confidence": 0.461,
"severity": "high",
"timestamp": "2026-01-06T07:18:00Z",
"trace_id": "5fb86536-9e1b-1d3f-6c44-79ffdbe0eb6a"
} | {
"account_age_days": 1652,
"account_id": "ACCT-D923458F17B9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.223
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 144,
"timestamp": "2026-01-05T20:11:00Z",
"transaction_amount_usd": 18.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 976.15,
"financial_exposure_usd": 1219.57,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103139",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-03T04:19:00Z",
"trace_id": "f40918d2-78e3-33d9-fac2-de8bd30959f4"
} | {
"account_age_days": 499,
"account_id": "ACCT-2D9FBAF97C81",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_3",
"session_entropy": 0.52
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1061,
"timestamp": "2026-01-03T04:19:00Z",
"transaction_amount_usd": 110224.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.399,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 411905.79,
"financial_exposure_usd": 692231.37,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107146",
"label": "benign",
"label_confidence": 0.619,
"severity": "medium",
"timestamp": "2026-01-05T23:06:00Z",
"trace_id": "6688033f-573a-7ca2-2d06-940d3ddb8cb6"
} | {
"account_age_days": 158,
"account_id": "ACCT-37ED26807973",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.814
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 400,
"timestamp": "2026-01-05T20:01:00Z",
"transaction_amount_usd": 19.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2025.34,
"financial_exposure_usd": 3100.24,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104465",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-04T02:25:00Z",
"trace_id": "fd6f36bc-0c4d-9bb5-43d2-fa8c887d5438"
} | {
"account_age_days": 117,
"account_id": "ACCT-884EF84078F4",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.78
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 138,
"timestamp": "2026-01-04T02:25:00Z",
"transaction_amount_usd": 1051454.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.802,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2891336.54,
"financial_exposure_usd": 4883065.58,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106334",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-05T09:34:00Z",
"trace_id": "ad0b678f-9797-269d-f24f-558daa94ff62"
} | {
"account_age_days": 221,
"account_id": "ACCT-DBEA21B90B96",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_2",
"session_entropy": 0.85
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 141,
"timestamp": "2026-01-05T09:34:00Z",
"transaction_amount_usd": 2386763.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.711,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2522576.91,
"financial_exposure_usd": 2694104.21,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109304",
"label": "benign",
"label_confidence": 0.727,
"severity": "low",
"timestamp": "2026-01-07T11:04:00Z",
"trace_id": "e00e279a-1732-7097-6699-bde95ed04503"
} | {
"account_age_days": 455,
"account_id": "ACCT-D4ACFEDDA5D3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.642
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 289,
"timestamp": "2026-01-07T11:04:00Z",
"transaction_amount_usd": 13352.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4174.3,
"financial_exposure_usd": 5320.98,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105865",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "medium",
"timestamp": "2026-01-05T01:45:00Z",
"trace_id": "84718a34-e310-a0d2-79b9-15ccfe1ad706"
} | {
"account_age_days": 1274,
"account_id": "ACCT-71F273FCC87C",
"baseline_risk_score": 0.075,
"kyc_tier": "tier_2",
"session_entropy": 0.847
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 360,
"timestamp": "2026-01-04T21:19:00Z",
"transaction_amount_usd": 4.56
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 585037.67,
"financial_exposure_usd": 616459.78,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106468",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "high",
"timestamp": "2026-01-05T11:48:00Z",
"trace_id": "6f38e242-f3b1-d25c-0795-a901f3bbc593"
} | {
"account_age_days": 691,
"account_id": "ACCT-0211A940E33F",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_1",
"session_entropy": 0.928
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 941,
"timestamp": "2026-01-05T11:48:00Z",
"transaction_amount_usd": 2040141.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.487,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3100910.92,
"financial_exposure_usd": 6459037.61,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109789",
"label": "benign",
"label_confidence": 0.469,
"severity": "medium",
"timestamp": "2026-01-07T19:09:00Z",
"trace_id": "469c59e8-0e71-34c3-4309-59648607e036"
} | {
"account_age_days": 618,
"account_id": "ACCT-201B32492843",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.602
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 224,
"timestamp": "2026-01-07T13:46:00Z",
"transaction_amount_usd": 21.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 903.76,
"financial_exposure_usd": 1967.62,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107396",
"label": "benign",
"label_confidence": 0.452,
"severity": "low",
"timestamp": "2026-01-06T03:16:00Z",
"trace_id": "79552820-8fd0-19b7-05f0-95391ff0f9ef"
} | {
"account_age_days": 337,
"account_id": "ACCT-9CB5B9EFBBAD",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.763
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 419,
"timestamp": "2026-01-06T03:16:00Z",
"transaction_amount_usd": 13378.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.56,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1580.26,
"financial_exposure_usd": 3476.99,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100325",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "critical",
"timestamp": "2026-01-01T05:25:00Z",
"trace_id": "7af7bd84-0121-221d-129c-717f636dde12"
} | {
"account_age_days": 1772,
"account_id": "ACCT-BE94EE365229",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_1",
"session_entropy": 0.75
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 212,
"timestamp": "2026-01-01T04:08:00Z",
"transaction_amount_usd": 23.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.678,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 637888.61,
"financial_exposure_usd": 676087.77,
"recoverable_pct": 0.771
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107167",
"label": "benign",
"label_confidence": 0.601,
"severity": "high",
"timestamp": "2026-01-05T23:27:00Z",
"trace_id": "3d5f3720-1aed-8813-95c9-508b6923452c"
} | {
"account_age_days": 949,
"account_id": "ACCT-743D19FD04DF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.411
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 206,
"timestamp": "2026-01-05T11:35:00Z",
"transaction_amount_usd": 3.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2877.48,
"financial_exposure_usd": 3657.75,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109859",
"label": "benign",
"label_confidence": 0.578,
"severity": "medium",
"timestamp": "2026-01-07T20:19:00Z",
"trace_id": "8b9b7b4b-9f10-1a66-846c-ab636b901a0a"
} | {
"account_age_days": 1183,
"account_id": "ACCT-AFDF79E81BF4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.691
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 348,
"timestamp": "2026-01-07T20:19:00Z",
"transaction_amount_usd": 9467.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.488,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4521.27,
"financial_exposure_usd": 6092.92,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105033",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-04T11:53:00Z",
"trace_id": "639a0c9a-5adc-cebe-b072-eef19f9dd1cd"
} | {
"account_age_days": 1403,
"account_id": "ACCT-9B08BD4BD622",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_1",
"session_entropy": 0.805
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1033,
"timestamp": "2026-01-04T11:53:00Z",
"transaction_amount_usd": 2241557.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.8,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 989163.51,
"financial_exposure_usd": 1394509.23,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107805",
"label": "benign",
"label_confidence": 0.617,
"severity": "medium",
"timestamp": "2026-01-06T10:05:00Z",
"trace_id": "bcc37fff-fe6c-307c-e505-8cb3e7cb1314"
} | {
"account_age_days": 920,
"account_id": "ACCT-CB609F168109",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.841
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 381,
"timestamp": "2026-01-06T00:55:00Z",
"transaction_amount_usd": 13.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.539,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1003.21,
"financial_exposure_usd": 2429.29,
"recoverable_pct": 0.701
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109820",
"label": "benign",
"label_confidence": 0.576,
"severity": "medium",
"timestamp": "2026-01-07T19:40:00Z",
"trace_id": "7f0eb4f3-3346-898a-f4fe-57365d982c84"
} | {
"account_age_days": 514,
"account_id": "ACCT-12CD44ED7406",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.764
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 208,
"timestamp": "2026-01-07T19:40:00Z",
"transaction_amount_usd": 1353.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2462.33,
"financial_exposure_usd": 3892.22,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105097",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-04T12:57:00Z",
"trace_id": "3ebca065-62ad-a711-911f-b14ac2f7903e"
} | {
"account_age_days": 556,
"account_id": "ACCT-FC98CEF4DEE2",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_2",
"session_entropy": 0.187
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 703,
"timestamp": "2026-01-04T12:57:00Z",
"transaction_amount_usd": 2741469.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.938,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2862042.65,
"financial_exposure_usd": 4351242.83,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105803",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "critical",
"timestamp": "2026-01-05T00:43:00Z",
"trace_id": "afaf270d-ccc6-4554-788b-16e34e4eeb4f"
} | {
"account_age_days": 835,
"account_id": "ACCT-F0BCF406F255",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_3",
"session_entropy": 0.253
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 158,
"timestamp": "2026-01-05T00:07:00Z",
"transaction_amount_usd": 16.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.667,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1125973.24,
"financial_exposure_usd": 2071543.19,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104150",
"label": "fraudulent",
"label_confidence": 0.724,
"severity": "critical",
"timestamp": "2026-01-03T21:10:00Z",
"trace_id": "a0b3a294-76ee-89c9-9d6c-d4031db66e0a"
} | {
"account_age_days": 750,
"account_id": "ACCT-598817175E99",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 102,
"timestamp": "2026-01-03T09:24:00Z",
"transaction_amount_usd": 23.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2661473.48,
"financial_exposure_usd": 4144868.5,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102285",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "critical",
"timestamp": "2026-01-02T14:05:00Z",
"trace_id": "da3bb42c-114b-648d-532f-48101b464772"
} | {
"account_age_days": 376,
"account_id": "ACCT-20673835E05F",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_2",
"session_entropy": 0.45
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 647,
"timestamp": "2026-01-02T14:05:00Z",
"transaction_amount_usd": 5297.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.584,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 469203.61,
"financial_exposure_usd": 476575.57,
"recoverable_pct": 0.364
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107558",
"label": "benign",
"label_confidence": 0.738,
"severity": "high",
"timestamp": "2026-01-06T05:58:00Z",
"trace_id": "0cc09bae-d4bd-2b09-10b7-9e41b5060bd9"
} | {
"account_age_days": 1136,
"account_id": "ACCT-665049DAC22C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.446
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 465,
"timestamp": "2026-01-06T05:58:00Z",
"transaction_amount_usd": 1808.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5749.44,
"financial_exposure_usd": 7827.54,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106506",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "low",
"timestamp": "2026-01-05T12:26:00Z",
"trace_id": "07b43240-d363-ddea-219b-8cac9fd1f9e0"
} | {
"account_age_days": 298,
"account_id": "ACCT-C159B57E5052",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_3",
"session_entropy": 0.184
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 703,
"timestamp": "2026-01-05T12:26:00Z",
"transaction_amount_usd": 1035443.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3601946.52,
"financial_exposure_usd": 6983698.82,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106652",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-05T14:52:00Z",
"trace_id": "41417df7-04d1-ed0b-da3b-d6cc38dfcd56"
} | {
"account_age_days": 1944,
"account_id": "ACCT-0ABF758CB3C3",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_2",
"session_entropy": 0.654
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 462,
"timestamp": "2026-01-05T14:52:00Z",
"transaction_amount_usd": 1857189.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.558,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3005788.52,
"financial_exposure_usd": 3488989.29,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108935",
"label": "benign",
"label_confidence": 0.471,
"severity": "high",
"timestamp": "2026-01-07T04:55:00Z",
"trace_id": "64ead32c-b174-0a96-73aa-649bfdebb810"
} | {
"account_age_days": 50,
"account_id": "ACCT-2AB24000C9C2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.656
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 907,
"timestamp": "2026-01-07T04:55:00Z",
"transaction_amount_usd": 11304.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.765,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2628.54,
"financial_exposure_usd": 2753.63,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103732",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "medium",
"timestamp": "2026-01-03T14:12:00Z",
"trace_id": "a8d1489e-f149-3cb8-8e34-131dc1e65d02"
} | {
"account_age_days": 1910,
"account_id": "ACCT-4180DCD50B30",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_1",
"session_entropy": 0.925
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 215,
"timestamp": "2026-01-03T04:19:00Z",
"transaction_amount_usd": 13.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2656224.4,
"financial_exposure_usd": 3112990.98,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104632",
"label": "fraudulent",
"label_confidence": 0.69,
"severity": "medium",
"timestamp": "2026-01-04T05:12:00Z",
"trace_id": "ff9841c7-b29d-0dc3-6641-4d2057a95a18"
} | {
"account_age_days": 631,
"account_id": "ACCT-530B5BE11DCD",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_2",
"session_entropy": 0.119
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 642,
"timestamp": "2026-01-04T05:12:00Z",
"transaction_amount_usd": 1452136.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.643,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2737845.8,
"financial_exposure_usd": 4823677.18,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106749",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-05T16:29:00Z",
"trace_id": "874891d6-0738-8868-66a9-4c8b40f88a68"
} | {
"account_age_days": 1956,
"account_id": "ACCT-F51BA68B43CC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.802
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 678,
"timestamp": "2026-01-05T16:29:00Z",
"transaction_amount_usd": 11444.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2383.46,
"financial_exposure_usd": 3162.47,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102164",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-02T12:04:00Z",
"trace_id": "c23d46c0-61eb-aac9-f98d-a1eaa70a0f07"
} | {
"account_age_days": 1155,
"account_id": "ACCT-C693CC8E472B",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_3",
"session_entropy": 0.587
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1127,
"timestamp": "2026-01-02T12:04:00Z",
"transaction_amount_usd": 59149.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 518572.1,
"financial_exposure_usd": 955926.11,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106635",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "low",
"timestamp": "2026-01-05T14:35:00Z",
"trace_id": "5d235539-385c-3d64-009d-a957535fae9a"
} | {
"account_age_days": 1625,
"account_id": "ACCT-2813B7D16059",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_3",
"session_entropy": 0.113
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 671,
"timestamp": "2026-01-05T14:35:00Z",
"transaction_amount_usd": 1026519.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3727633.09,
"financial_exposure_usd": 5492202.57,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101481",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "low",
"timestamp": "2026-01-02T00:41:00Z",
"trace_id": "a0ae50f0-f3d5-f858-88a4-2745e155467b"
} | {
"account_age_days": 1135,
"account_id": "ACCT-5BA9AD33484F",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_3",
"session_entropy": 0.26
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 839,
"timestamp": "2026-01-02T00:41:00Z",
"transaction_amount_usd": 57737.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.592,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 588633.36,
"financial_exposure_usd": 641009.27,
"recoverable_pct": 0.134
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107562",
"label": "benign",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-06T06:02:00Z",
"trace_id": "2b423535-23f1-191c-191c-306dac9077a8"
} | {
"account_age_days": 978,
"account_id": "ACCT-368EED48C199",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.934
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 169,
"timestamp": "2026-01-06T01:13:00Z",
"transaction_amount_usd": 24.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2174.29,
"financial_exposure_usd": 3244.5,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103189",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-03T05:09:00Z",
"trace_id": "486b1132-b4a0-bdc7-2d90-3845fb8b2513"
} | {
"account_age_days": 333,
"account_id": "ACCT-CB870D8D4808",
"baseline_risk_score": 0.547,
"kyc_tier": "tier_1",
"session_entropy": 0.824
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 198,
"timestamp": "2026-01-03T05:09:00Z",
"transaction_amount_usd": 56932.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.939,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 433308.32,
"financial_exposure_usd": 499281.61,
"recoverable_pct": 0.379
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104580",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "high",
"timestamp": "2026-01-04T04:20:00Z",
"trace_id": "a0faf170-9f6d-a76b-4e0d-39d9c137b1b4"
} | {
"account_age_days": 1392,
"account_id": "ACCT-D7E99F8778A3",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_1",
"session_entropy": 0.352
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 545,
"timestamp": "2026-01-04T04:20:00Z",
"transaction_amount_usd": 338231.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.368,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3798217.32,
"financial_exposure_usd": 4854573.66,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107456",
"label": "benign",
"label_confidence": 0.734,
"severity": "low",
"timestamp": "2026-01-06T04:16:00Z",
"trace_id": "d6a16dfe-92fa-41dc-9038-f7a2177b708b"
} | {
"account_age_days": 1444,
"account_id": "ACCT-A369E433BA87",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.236
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 852,
"timestamp": "2026-01-06T04:16:00Z",
"transaction_amount_usd": 4517.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3866.43,
"financial_exposure_usd": 4252.91,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102346",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "critical",
"timestamp": "2026-01-02T15:06:00Z",
"trace_id": "eef11c97-5373-34b3-575a-fc5317f25b99"
} | {
"account_age_days": 403,
"account_id": "ACCT-71CA662B65F3",
"baseline_risk_score": 0.52,
"kyc_tier": "tier_2",
"session_entropy": 0.442
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 278,
"timestamp": "2026-01-02T07:54:00Z",
"transaction_amount_usd": 24.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.583,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 525051.66,
"financial_exposure_usd": 622684.39,
"recoverable_pct": 0.234
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104918",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "high",
"timestamp": "2026-01-04T09:58:00Z",
"trace_id": "f0ccf6b5-fac4-86be-d0f6-6f1d8c2247c0"
} | {
"account_age_days": 1189,
"account_id": "ACCT-965DAF95540A",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.103
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 632,
"timestamp": "2026-01-04T09:58:00Z",
"transaction_amount_usd": 2737468.83
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.698,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1427419.16,
"financial_exposure_usd": 1742422.73,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103103",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "low",
"timestamp": "2026-01-03T03:43:00Z",
"trace_id": "fee38997-1ded-46ef-6cc6-9100fbc1da7a"
} | {
"account_age_days": 1979,
"account_id": "ACCT-2CE1022B0F0A",
"baseline_risk_score": 0.576,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 620,
"timestamp": "2026-01-03T03:43:00Z",
"transaction_amount_usd": 111506.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.474,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 741127.2,
"financial_exposure_usd": 1115293.31,
"recoverable_pct": 0.093
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102531",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-02T18:11:00Z",
"trace_id": "c5e747bb-6903-6c05-5baa-d0d3c844c38f"
} | {
"account_age_days": 1824,
"account_id": "ACCT-783CDED3D1D3",
"baseline_risk_score": 0.523,
"kyc_tier": "tier_2",
"session_entropy": 0.927
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 172,
"timestamp": "2026-01-02T10:40:00Z",
"transaction_amount_usd": 3.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.914,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 401573.65,
"financial_exposure_usd": 453539.52,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105333",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "low",
"timestamp": "2026-01-04T16:53:00Z",
"trace_id": "af29a236-0e2c-9e8e-f896-5fdd87c32657"
} | {
"account_age_days": 877,
"account_id": "ACCT-C0472566161A",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.366
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 286,
"timestamp": "2026-01-04T12:30:00Z",
"transaction_amount_usd": 5.09
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.873,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1264908.39,
"financial_exposure_usd": 1675892.85,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102491",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-02T17:31:00Z",
"trace_id": "70c1e6f3-60d5-127d-c3e7-5fc79b965373"
} | {
"account_age_days": 127,
"account_id": "ACCT-D91780979F25",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_1",
"session_entropy": 0.693
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 780,
"timestamp": "2026-01-02T17:31:00Z",
"transaction_amount_usd": 79160.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.383,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 819131.82,
"financial_exposure_usd": 1159861.07,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101074",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "medium",
"timestamp": "2026-01-01T17:54:00Z",
"trace_id": "66bb2ea3-71d7-cda9-c279-b4cb54af1a28"
} | {
"account_age_days": 1307,
"account_id": "ACCT-11F685C102C8",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_2",
"session_entropy": 0.606
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 870,
"timestamp": "2026-01-01T17:54:00Z",
"transaction_amount_usd": 95801.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.821,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 533325.74,
"financial_exposure_usd": 729828.39,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104099",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-03T20:19:00Z",
"trace_id": "678b957e-8cb5-00ce-7832-c7663d0cc205"
} | {
"account_age_days": 1239,
"account_id": "ACCT-94514EE2F5ED",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_1",
"session_entropy": 0.654
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 219,
"timestamp": "2026-01-03T20:19:00Z",
"transaction_amount_usd": 788319.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2654086.48,
"financial_exposure_usd": 3642197.49,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106697",
"label": "benign",
"label_confidence": 0.559,
"severity": "medium",
"timestamp": "2026-01-05T15:37:00Z",
"trace_id": "d422a2a9-fc38-94dc-cf24-4f740d2f6bd6"
} | {
"account_age_days": 1215,
"account_id": "ACCT-18FE7BFDB543",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.899
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 294,
"timestamp": "2026-01-05T12:02:00Z",
"transaction_amount_usd": 24.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2246.85,
"financial_exposure_usd": 4256.5,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102181",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "critical",
"timestamp": "2026-01-02T12:21:00Z",
"trace_id": "b2101a9e-8373-5ee9-9d94-9d36a1dea79d"
} | {
"account_age_days": 1594,
"account_id": "ACCT-E854BC96CB3D",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_2",
"session_entropy": 0.404
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 170,
"timestamp": "2026-01-02T12:21:00Z",
"transaction_amount_usd": 95005.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.767,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1055402.23,
"financial_exposure_usd": 1144145.53,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100043",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-01T00:43:00Z",
"trace_id": "12af97e4-c536-c66e-fcc4-091bf45707c6"
} | {
"account_age_days": 63,
"account_id": "ACCT-1E38F711E2EC",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_2",
"session_entropy": 0.756
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 895,
"timestamp": "2026-01-01T00:43:00Z",
"transaction_amount_usd": 2148.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 732559.63,
"financial_exposure_usd": 1313372.73,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105445",
"label": "fraudulent",
"label_confidence": 0.68,
"severity": "high",
"timestamp": "2026-01-04T18:45:00Z",
"trace_id": "ad87d7c2-74e6-8386-bf09-2318339da4fc"
} | {
"account_age_days": 634,
"account_id": "ACCT-D54037F11D78",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_1",
"session_entropy": 0.583
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 970,
"timestamp": "2026-01-04T18:45:00Z",
"transaction_amount_usd": 1098503.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.372,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1999503.57,
"financial_exposure_usd": 4792877.57,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107670",
"label": "benign",
"label_confidence": 0.511,
"severity": "medium",
"timestamp": "2026-01-06T07:50:00Z",
"trace_id": "3b25bd97-d52c-53ed-fddb-0a53961201bd"
} | {
"account_age_days": 614,
"account_id": "ACCT-051A4311C057",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.353
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 320,
"timestamp": "2026-01-06T07:50:00Z",
"transaction_amount_usd": 13278.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1986.46,
"financial_exposure_usd": 2045.73,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101211",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-01T20:11:00Z",
"trace_id": "cb659f9f-4646-97ba-5a5b-5f86394bd375"
} | {
"account_age_days": 856,
"account_id": "ACCT-978D5C4E4C6B",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1143,
"timestamp": "2026-01-01T20:11:00Z",
"transaction_amount_usd": 71290.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 259181.27,
"financial_exposure_usd": 308149.58,
"recoverable_pct": 0.106
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109858",
"label": "benign",
"label_confidence": 0.501,
"severity": "high",
"timestamp": "2026-01-07T20:18:00Z",
"trace_id": "51b82f4c-77a0-e12e-5e64-45e1a694fc6f"
} | {
"account_age_days": 1686,
"account_id": "ACCT-5E2A66A929CC",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.435
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1115,
"timestamp": "2026-01-07T20:18:00Z",
"transaction_amount_usd": 2709.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5693.32,
"financial_exposure_usd": 5932.77,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101951",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "critical",
"timestamp": "2026-01-02T08:31:00Z",
"trace_id": "39679543-9e7e-df5c-84a7-a6e9402e9b59"
} | {
"account_age_days": 179,
"account_id": "ACCT-9AC7F3E3D5E6",
"baseline_risk_score": 0.602,
"kyc_tier": "tier_1",
"session_entropy": 0.508
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 188,
"timestamp": "2026-01-01T22:52:00Z",
"transaction_amount_usd": 23.19
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 1004817.71,
"financial_exposure_usd": 1215103.8,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106679",
"label": "benign",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-05T15:19:00Z",
"trace_id": "fc903ab1-6e03-f7e2-d251-17fc58aae636"
} | {
"account_age_days": 1805,
"account_id": "ACCT-084DD8B671CF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.131
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 407,
"timestamp": "2026-01-05T15:19:00Z",
"transaction_amount_usd": 3054.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1371.75,
"financial_exposure_usd": 3190.26,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104869",
"label": "fraudulent",
"label_confidence": 0.709,
"severity": "critical",
"timestamp": "2026-01-04T09:09:00Z",
"trace_id": "ac7ae723-bd96-d177-77d9-8c19bf0e382d"
} | {
"account_age_days": 27,
"account_id": "ACCT-F7C0CABDF17B",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_3",
"session_entropy": 0.212
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 288,
"timestamp": "2026-01-03T20:28:00Z",
"transaction_amount_usd": 12.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.724,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1550414.7,
"financial_exposure_usd": 2928940.57,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102805",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-02T22:45:00Z",
"trace_id": "e8cd3aee-3eaa-ae94-c061-65ced8005373"
} | {
"account_age_days": 1404,
"account_id": "ACCT-6BD838436B2F",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 355,
"timestamp": "2026-01-02T15:42:00Z",
"transaction_amount_usd": 6.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 553768.38,
"financial_exposure_usd": 627967.14,
"recoverable_pct": 0.2
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104535",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-04T03:35:00Z",
"trace_id": "27232282-156b-c3f7-391b-b0bb82db1900"
} | {
"account_age_days": 701,
"account_id": "ACCT-0226CC4E8EAE",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_1",
"session_entropy": 0.322
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 103,
"timestamp": "2026-01-04T01:13:00Z",
"transaction_amount_usd": 2.26
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.613,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2532210.46,
"financial_exposure_usd": 3357410.79,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101680",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-02T04:00:00Z",
"trace_id": "2c2a1af6-5d3d-7ab6-f3b4-176d367439da"
} | {
"account_age_days": 335,
"account_id": "ACCT-68373848BF52",
"baseline_risk_score": 0.632,
"kyc_tier": "tier_1",
"session_entropy": 0.606
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 809,
"timestamp": "2026-01-02T04:00:00Z",
"transaction_amount_usd": 42457.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.589,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1047619.38,
"financial_exposure_usd": 1119848.28,
"recoverable_pct": 0.298
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108452",
"label": "benign",
"label_confidence": 0.573,
"severity": "high",
"timestamp": "2026-01-06T20:52:00Z",
"trace_id": "bfc8ca95-1f96-dcbb-a54e-9d560d681c16"
} | {
"account_age_days": 465,
"account_id": "ACCT-700DD0732564",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.932
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 347,
"timestamp": "2026-01-06T19:00:00Z",
"transaction_amount_usd": 8.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.716,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1500.97,
"financial_exposure_usd": 2491.34,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104261",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-03T23:01:00Z",
"trace_id": "245f3d89-5c7b-63fb-43fe-60205f76d99f"
} | {
"account_age_days": 1224,
"account_id": "ACCT-B96F14385BB3",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_3",
"session_entropy": 0.482
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 197,
"timestamp": "2026-01-03T11:44:00Z",
"transaction_amount_usd": 22.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.663,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1789536.27,
"financial_exposure_usd": 2951430.07,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106619",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-05T14:19:00Z",
"trace_id": "1e03b085-6412-fb5c-2cb0-f6b0e15bd85d"
} | {
"account_age_days": 649,
"account_id": "ACCT-B3B92E17E19A",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_1",
"session_entropy": 0.28
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 188,
"timestamp": "2026-01-05T04:33:00Z",
"transaction_amount_usd": 13.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.859,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4148484.36,
"financial_exposure_usd": 4352851.79,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106493",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "high",
"timestamp": "2026-01-05T12:13:00Z",
"trace_id": "45cc9caa-3f4c-81bb-aee2-2a047af1b248"
} | {
"account_age_days": 1820,
"account_id": "ACCT-52F419CF5F55",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_1",
"session_entropy": 0.847
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 280,
"timestamp": "2026-01-05T12:13:00Z",
"transaction_amount_usd": 222501.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1928545.19,
"financial_exposure_usd": 4408886.29,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103560",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-03T11:20:00Z",
"trace_id": "43df0396-28d3-34b4-e59a-8a1ee470df4e"
} | {
"account_age_days": 87,
"account_id": "ACCT-0C7489F25D0A",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_3",
"session_entropy": 0.915
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 197,
"timestamp": "2026-01-03T00:39:00Z",
"transaction_amount_usd": 2.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.587,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7182695.27,
"financial_exposure_usd": 7584062.29,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106970",
"label": "benign",
"label_confidence": 0.564,
"severity": "high",
"timestamp": "2026-01-05T20:10:00Z",
"trace_id": "8142264d-08ae-e8a5-98a5-ce23234d27ce"
} | {
"account_age_days": 936,
"account_id": "ACCT-75515CBAA5B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.874
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 301,
"timestamp": "2026-01-05T11:54:00Z",
"transaction_amount_usd": 17.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1113.35,
"financial_exposure_usd": 1301.52,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106915",
"label": "benign",
"label_confidence": 0.516,
"severity": "medium",
"timestamp": "2026-01-05T19:15:00Z",
"trace_id": "a7bbdd49-7544-4087-549c-8c15203c6f93"
} | {
"account_age_days": 19,
"account_id": "ACCT-FC0C7F1593B4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.758
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1017,
"timestamp": "2026-01-05T19:15:00Z",
"transaction_amount_usd": 11167.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.749,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1321.92,
"financial_exposure_usd": 1471.01,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100506",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-01T08:26:00Z",
"trace_id": "c4ce1d19-d767-a1fc-847d-cdd6411a2578"
} | {
"account_age_days": 1870,
"account_id": "ACCT-28B12FD25C92",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.276
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 94,
"timestamp": "2026-01-01T08:26:00Z",
"transaction_amount_usd": 52226.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.889,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 179677.39,
"financial_exposure_usd": 285810.83,
"recoverable_pct": 0.186
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105327",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "critical",
"timestamp": "2026-01-04T16:47:00Z",
"trace_id": "7239801d-6f90-2ded-a9f9-6b0fcc102d65"
} | {
"account_age_days": 1437,
"account_id": "ACCT-202EA45C8171",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 283,
"timestamp": "2026-01-04T16:47:00Z",
"transaction_amount_usd": 2722659.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2902953.39,
"financial_exposure_usd": 4858855.19,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107950",
"label": "benign",
"label_confidence": 0.598,
"severity": "medium",
"timestamp": "2026-01-06T12:30:00Z",
"trace_id": "97c95ce2-0fd5-f2b6-9707-c1a0e8e36a5c"
} | {
"account_age_days": 719,
"account_id": "ACCT-D44F9A3D954E",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.229
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 244,
"timestamp": "2026-01-06T11:18:00Z",
"transaction_amount_usd": 17.53
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1575.4,
"financial_exposure_usd": 1641.82,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109854",
"label": "benign",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-07T20:14:00Z",
"trace_id": "c332168a-1e31-1c1e-f972-9a3c93bedc02"
} | {
"account_age_days": 1039,
"account_id": "ACCT-1DA0856EE5AC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.866
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 348,
"timestamp": "2026-01-07T08:43:00Z",
"transaction_amount_usd": 21.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 920.04,
"financial_exposure_usd": 1678.35,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101314",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "low",
"timestamp": "2026-01-01T21:54:00Z",
"trace_id": "4bb8f598-2098-6c89-c13a-1c8f833a44da"
} | {
"account_age_days": 1926,
"account_id": "ACCT-FC0784705D9C",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_1",
"session_entropy": 0.585
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1145,
"timestamp": "2026-01-01T21:54:00Z",
"transaction_amount_usd": 41270.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.465,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 350591.96,
"financial_exposure_usd": 539367.67,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102435",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-02T16:35:00Z",
"trace_id": "7f358376-603d-db16-3a50-d31a580a7b36"
} | {
"account_age_days": 449,
"account_id": "ACCT-CFB1F9889D95",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_3",
"session_entropy": 0.193
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 600,
"timestamp": "2026-01-02T16:35:00Z",
"transaction_amount_usd": 70108.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 471268.13,
"financial_exposure_usd": 951351.87,
"recoverable_pct": 0.03
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101083",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "low",
"timestamp": "2026-01-01T18:03:00Z",
"trace_id": "4ff362db-6439-fc5f-edce-b1c94f1da16d"
} | {
"account_age_days": 996,
"account_id": "ACCT-2382359178D1",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.948
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 544,
"timestamp": "2026-01-01T18:03:00Z",
"transaction_amount_usd": 72633.26
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.532,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 792217.13,
"financial_exposure_usd": 801102.66,
"recoverable_pct": 0.459
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100732",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "high",
"timestamp": "2026-01-01T12:12:00Z",
"trace_id": "402077fb-2855-34b4-3bf3-4f6cf83296c1"
} | {
"account_age_days": 1173,
"account_id": "ACCT-FEECCB47AC86",
"baseline_risk_score": 0.507,
"kyc_tier": "tier_3",
"session_entropy": 0.831
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 922,
"timestamp": "2026-01-01T12:12:00Z",
"transaction_amount_usd": 90060.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.556,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 567044.56,
"financial_exposure_usd": 1402031.54,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105693",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-04T22:53:00Z",
"trace_id": "ff352052-0ce9-499c-8d06-d1fa293fc110"
} | {
"account_age_days": 1860,
"account_id": "ACCT-FC057C2DA808",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_1",
"session_entropy": 0.729
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 361,
"timestamp": "2026-01-04T12:46:00Z",
"transaction_amount_usd": 5.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.828,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 561904.25,
"financial_exposure_usd": 915524.59,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104402",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-04T01:22:00Z",
"trace_id": "0f6543ed-e5c7-f6bd-4cdd-b2fedcd8625d"
} | {
"account_age_days": 20,
"account_id": "ACCT-1074621ABDA7",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_2",
"session_entropy": 0.434
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 654,
"timestamp": "2026-01-04T01:22:00Z",
"transaction_amount_usd": 1314466.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.722,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3582735.59,
"financial_exposure_usd": 5661837.11,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107580",
"label": "benign",
"label_confidence": 0.585,
"severity": "low",
"timestamp": "2026-01-06T06:20:00Z",
"trace_id": "f6f9455f-a073-c319-5a73-0c1bcfb250c2"
} | {
"account_age_days": 1506,
"account_id": "ACCT-EE9D026DF9BB",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_2",
"session_entropy": 0.151
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 186,
"timestamp": "2026-01-05T19:51:00Z",
"transaction_amount_usd": 21.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.626,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2498.08,
"financial_exposure_usd": 3732.44,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105465",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "critical",
"timestamp": "2026-01-04T19:05:00Z",
"trace_id": "b565a14b-8026-6bbd-da40-1f5da44f41bb"
} | {
"account_age_days": 1594,
"account_id": "ACCT-BEC1D8B56014",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_3",
"session_entropy": 0.502
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 489,
"timestamp": "2026-01-04T19:05:00Z",
"transaction_amount_usd": 404734.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.706,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3318907.9,
"financial_exposure_usd": 3433113.68,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109389",
"label": "benign",
"label_confidence": 0.539,
"severity": "low",
"timestamp": "2026-01-07T12:29:00Z",
"trace_id": "819f87d7-ce45-a000-00cc-61f18356111f"
} | {
"account_age_days": 1370,
"account_id": "ACCT-C0B4086FC0CE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.864
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 249,
"timestamp": "2026-01-07T09:16:00Z",
"transaction_amount_usd": 7.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3677.29,
"financial_exposure_usd": 4262.76,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109173",
"label": "benign",
"label_confidence": 0.72,
"severity": "high",
"timestamp": "2026-01-07T08:53:00Z",
"trace_id": "98f18449-0fb1-ef65-b135-4f25cbeefe2d"
} | {
"account_age_days": 1478,
"account_id": "ACCT-197F4ADFE039",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.908
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 277,
"timestamp": "2026-01-07T08:53:00Z",
"transaction_amount_usd": 4924.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3765.25,
"financial_exposure_usd": 4622.27,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102146",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "high",
"timestamp": "2026-01-02T11:46:00Z",
"trace_id": "0ebb9015-8840-a662-bdda-d9995827a791"
} | {
"account_age_days": 1053,
"account_id": "ACCT-EC4A137E2F91",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 315,
"timestamp": "2026-01-02T05:34:00Z",
"transaction_amount_usd": 18.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.598,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 918296.77,
"financial_exposure_usd": 1113309.66,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107552",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-06T05:52:00Z",
"trace_id": "1903127f-4797-80d2-91e1-8f160ebd8d66"
} | {
"account_age_days": 787,
"account_id": "ACCT-C3F52B68C17B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 203,
"timestamp": "2026-01-06T03:11:00Z",
"transaction_amount_usd": 3.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.635,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 877.56,
"financial_exposure_usd": 1463.71,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101494",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "critical",
"timestamp": "2026-01-02T00:54:00Z",
"trace_id": "fe3ebab5-af42-3cb3-dba3-f456aff33d1c"
} | {
"account_age_days": 1906,
"account_id": "ACCT-8FF81E0A5C47",
"baseline_risk_score": 0.268,
"kyc_tier": "tier_3",
"session_entropy": 0.742
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 612,
"timestamp": "2026-01-02T00:54:00Z",
"transaction_amount_usd": 53274.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 562078.36,
"financial_exposure_usd": 863571.99,
"recoverable_pct": 0.269
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102332",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "critical",
"timestamp": "2026-01-02T14:52:00Z",
"trace_id": "f6698976-40ba-271c-5675-8500991cadb4"
} | {
"account_age_days": 465,
"account_id": "ACCT-D03B5CE70690",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.949
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 212,
"timestamp": "2026-01-02T14:02:00Z",
"transaction_amount_usd": 7.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.7,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 306841.29,
"financial_exposure_usd": 527424.71,
"recoverable_pct": 0.358
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106184",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-05T07:04:00Z",
"trace_id": "853b337a-c561-9421-2013-6f5c09a9abfa"
} | {
"account_age_days": 652,
"account_id": "ACCT-8D4ECDE3BF29",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_3",
"session_entropy": 0.36
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1022,
"timestamp": "2026-01-05T07:04:00Z",
"transaction_amount_usd": 2060589.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.758,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3405691.3,
"financial_exposure_usd": 3942715.17,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105712",
"label": "fraudulent",
"label_confidence": 0.718,
"severity": "medium",
"timestamp": "2026-01-04T23:12:00Z",
"trace_id": "1633e67f-8c9f-8f0b-6c51-e895905383e6"
} | {
"account_age_days": 1600,
"account_id": "ACCT-C8732838E444",
"baseline_risk_score": 0.246,
"kyc_tier": "tier_3",
"session_entropy": 0.933
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 576,
"timestamp": "2026-01-04T23:12:00Z",
"transaction_amount_usd": 2396511.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.885,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3775863.73,
"financial_exposure_usd": 5458994.46,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103859",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-03T16:19:00Z",
"trace_id": "3b5bed6c-f28f-0f0e-e38c-b067d3278243"
} | {
"account_age_days": 997,
"account_id": "ACCT-3825739C2149",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.678
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 376,
"timestamp": "2026-01-03T16:19:00Z",
"transaction_amount_usd": 2128393.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.465,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2207237.94,
"financial_exposure_usd": 3234733.81,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102835",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "high",
"timestamp": "2026-01-02T23:15:00Z",
"trace_id": "dce046e9-18c8-0885-f3ac-d4f25f3f9fe4"
} | {
"account_age_days": 1043,
"account_id": "ACCT-7B39CD8504AB",
"baseline_risk_score": 0.584,
"kyc_tier": "tier_2",
"session_entropy": 0.179
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 905,
"timestamp": "2026-01-02T23:15:00Z",
"transaction_amount_usd": 13063.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.392,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 443156.65,
"financial_exposure_usd": 589303.72,
"recoverable_pct": 0.058
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105230",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "high",
"timestamp": "2026-01-04T15:10:00Z",
"trace_id": "9808b49e-d07f-5a55-4bce-8942e7257656"
} | {
"account_age_days": 1137,
"account_id": "ACCT-1CABB8008CF7",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_2",
"session_entropy": 0.242
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 350,
"timestamp": "2026-01-04T04:20:00Z",
"transaction_amount_usd": 2.92
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.932,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4897233.17,
"financial_exposure_usd": 5213670.5,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106495",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "medium",
"timestamp": "2026-01-05T12:15:00Z",
"trace_id": "f696fa51-fb3a-c807-af83-4ab9b5b9fabd"
} | {
"account_age_days": 809,
"account_id": "ACCT-EB2CAC70C006",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_3",
"session_entropy": 0.204
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 612,
"timestamp": "2026-01-05T12:15:00Z",
"transaction_amount_usd": 1172656.21
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.855,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5410046.07,
"financial_exposure_usd": 5895180.51,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102899",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-03T00:19:00Z",
"trace_id": "c0fd872d-da64-bbd0-5351-9f89984b6312"
} | {
"account_age_days": 1608,
"account_id": "ACCT-C935C6CC5ED4",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_1",
"session_entropy": 0.225
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 114,
"timestamp": "2026-01-03T00:19:00Z",
"transaction_amount_usd": 52534.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.555,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 782476.31,
"financial_exposure_usd": 837395.48,
"recoverable_pct": 0.046
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105677",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "high",
"timestamp": "2026-01-04T22:37:00Z",
"trace_id": "8b2e2e11-72f5-c0d9-0d01-c344ddb00bf0"
} | {
"account_age_days": 1481,
"account_id": "ACCT-E3E1A1F4812C",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.861
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 299,
"timestamp": "2026-01-04T18:12:00Z",
"transaction_amount_usd": 18.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.376,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2799780.55,
"financial_exposure_usd": 6248099.41,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102136",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T11:36:00Z",
"trace_id": "bca203a3-2ac4-e793-c491-2c7c8046020f"
} | {
"account_age_days": 1940,
"account_id": "ACCT-FDD20DD67B26",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 269,
"timestamp": "2026-01-02T11:36:00Z",
"transaction_amount_usd": 104803.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.933,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 491271.33,
"financial_exposure_usd": 597123.75,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107383",
"label": "benign",
"label_confidence": 0.453,
"severity": "high",
"timestamp": "2026-01-06T03:03:00Z",
"trace_id": "ad43c902-7a42-6892-6ae4-4755cbade87d"
} | {
"account_age_days": 1866,
"account_id": "ACCT-9104FA5EB2FD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.56
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 124,
"timestamp": "2026-01-06T02:12:00Z",
"transaction_amount_usd": 17.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2395.29,
"financial_exposure_usd": 5625.75,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105574",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "critical",
"timestamp": "2026-01-04T20:54:00Z",
"trace_id": "0f38c15e-9bd2-a6c1-5a19-31c4fe419076"
} | {
"account_age_days": 425,
"account_id": "ACCT-D7A81BBE881D",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_1",
"session_entropy": 0.94
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 642,
"timestamp": "2026-01-04T20:54:00Z",
"transaction_amount_usd": 179720.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.376,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3851155.18,
"financial_exposure_usd": 7974602.45,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105676",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "critical",
"timestamp": "2026-01-04T22:36:00Z",
"trace_id": "724a1638-ac5c-1160-19c2-361c05d1b52c"
} | {
"account_age_days": 1038,
"account_id": "ACCT-EA6C4F49997D",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.175
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 334,
"timestamp": "2026-01-04T18:20:00Z",
"transaction_amount_usd": 19.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3422024.3,
"financial_exposure_usd": 5305351.73,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102442",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "critical",
"timestamp": "2026-01-02T16:42:00Z",
"trace_id": "ff45fb36-397a-2af5-2221-9d4a4e0dcb2f"
} | {
"account_age_days": 965,
"account_id": "ACCT-D45013BD876B",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_3",
"session_entropy": 0.896
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 86,
"timestamp": "2026-01-02T14:59:00Z",
"transaction_amount_usd": 23.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.603,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 834829.73,
"financial_exposure_usd": 1306100.96,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.