schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106172",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "high",
"timestamp": "2026-01-05T06:52:00Z",
"trace_id": "e2b2269e-2b74-e14b-9a81-457aa4ccdec6"
} | {
"account_age_days": 19,
"account_id": "ACCT-87E4DD8668BA",
"baseline_risk_score": 0.233,
"kyc_tier": "tier_2",
"session_entropy": 0.418
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 155,
"timestamp": "2026-01-04T20:41:00Z",
"transaction_amount_usd": 17.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.84,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1404727.12,
"financial_exposure_usd": 2664933.1,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105733",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "medium",
"timestamp": "2026-01-04T23:33:00Z",
"trace_id": "89dc3c07-9e43-a381-4cc1-fa33a53fca1e"
} | {
"account_age_days": 1646,
"account_id": "ACCT-ABB840645F0D",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_3",
"session_entropy": 0.42
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 165,
"timestamp": "2026-01-04T21:46:00Z",
"transaction_amount_usd": 13.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.697,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3441117.4,
"financial_exposure_usd": 3889165.29,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103263",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "high",
"timestamp": "2026-01-03T06:23:00Z",
"trace_id": "95892741-dc49-5cc2-bc51-c2ff213d06d8"
} | {
"account_age_days": 1511,
"account_id": "ACCT-489D6C212BA0",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_3",
"session_entropy": 0.827
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 623,
"timestamp": "2026-01-03T06:23:00Z",
"transaction_amount_usd": 10239.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 390516.81,
"financial_exposure_usd": 562310.5,
"recoverable_pct": 0.204
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106964",
"label": "benign",
"label_confidence": 0.634,
"severity": "medium",
"timestamp": "2026-01-05T20:04:00Z",
"trace_id": "6a128490-5ea8-35d6-f4ea-0603c4df79bc"
} | {
"account_age_days": 99,
"account_id": "ACCT-E4E1E9F42ED1",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_2",
"session_entropy": 0.377
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 130,
"timestamp": "2026-01-05T20:04:00Z",
"transaction_amount_usd": 2482.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2516.54,
"financial_exposure_usd": 6086.53,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107715",
"label": "benign",
"label_confidence": 0.504,
"severity": "medium",
"timestamp": "2026-01-06T08:35:00Z",
"trace_id": "4d871bb9-ec75-44e0-3ad0-b2645cc39b4b"
} | {
"account_age_days": 1125,
"account_id": "ACCT-910F65D019DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.72
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 460,
"timestamp": "2026-01-06T08:35:00Z",
"transaction_amount_usd": 9790.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 889.08,
"financial_exposure_usd": 1140.89,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106810",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-05T17:30:00Z",
"trace_id": "a708d4ff-45b0-6f9e-e87d-35d32dd45f55"
} | {
"account_age_days": 145,
"account_id": "ACCT-ACF657B0A2DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 653,
"timestamp": "2026-01-05T17:30:00Z",
"transaction_amount_usd": 3429.33
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 240.92,
"financial_exposure_usd": 305.09,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108304",
"label": "benign",
"label_confidence": 0.738,
"severity": "critical",
"timestamp": "2026-01-06T18:24:00Z",
"trace_id": "f8e21924-0f06-19d4-fb2e-6236e4baf807"
} | {
"account_age_days": 1023,
"account_id": "ACCT-58C21C454050",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.59
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 416,
"timestamp": "2026-01-06T18:24:00Z",
"transaction_amount_usd": 5806.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1595.74,
"financial_exposure_usd": 2760.35,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106092",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "high",
"timestamp": "2026-01-05T05:32:00Z",
"trace_id": "9ed1c71d-12dd-0e97-b330-64d36fbe4401"
} | {
"account_age_days": 170,
"account_id": "ACCT-7384E0F02D1E",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_2",
"session_entropy": 0.266
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 842,
"timestamp": "2026-01-05T05:32:00Z",
"transaction_amount_usd": 1160797.87
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.403,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4899089.19,
"financial_exposure_usd": 9807803.53,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108092",
"label": "benign",
"label_confidence": 0.673,
"severity": "low",
"timestamp": "2026-01-06T14:52:00Z",
"trace_id": "4928cd12-130a-353d-81c4-cb9c330b4714"
} | {
"account_age_days": 1648,
"account_id": "ACCT-08C99999FBB0",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.697
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 942,
"timestamp": "2026-01-06T14:52:00Z",
"transaction_amount_usd": 870.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1203.03,
"financial_exposure_usd": 2033.87,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108112",
"label": "benign",
"label_confidence": 0.691,
"severity": "high",
"timestamp": "2026-01-06T15:12:00Z",
"trace_id": "42863598-0c7b-e420-471d-a2470f59331e"
} | {
"account_age_days": 1852,
"account_id": "ACCT-81AF1E7F7FF6",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.809
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 608,
"timestamp": "2026-01-06T15:12:00Z",
"transaction_amount_usd": 7910.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 392.75,
"financial_exposure_usd": 871.46,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101669",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "medium",
"timestamp": "2026-01-02T03:49:00Z",
"trace_id": "05f95114-8a6f-ac82-8a3e-bdbe1ed67c17"
} | {
"account_age_days": 1163,
"account_id": "ACCT-B3F8674738B4",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_1",
"session_entropy": 0.882
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 161,
"timestamp": "2026-01-01T21:52:00Z",
"transaction_amount_usd": 3.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 774450.73,
"financial_exposure_usd": 1018968.91,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101543",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-02T01:43:00Z",
"trace_id": "8a4031a3-c1ad-e3ce-4575-69bba3f04cc8"
} | {
"account_age_days": 417,
"account_id": "ACCT-AC8464249A72",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_3",
"session_entropy": 0.826
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 739,
"timestamp": "2026-01-02T01:43:00Z",
"transaction_amount_usd": 52487.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.411,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 889089.33,
"financial_exposure_usd": 915378.1,
"recoverable_pct": 0.391
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108116",
"label": "benign",
"label_confidence": 0.458,
"severity": "high",
"timestamp": "2026-01-06T15:16:00Z",
"trace_id": "a59a53d1-1fab-c79e-6300-ff10a936b51f"
} | {
"account_age_days": 1356,
"account_id": "ACCT-8C4E66151EFA",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_2",
"session_entropy": 0.589
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 784,
"timestamp": "2026-01-06T15:16:00Z",
"transaction_amount_usd": 7781.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 321.28,
"financial_exposure_usd": 332.62,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100756",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-01T12:36:00Z",
"trace_id": "8f702f01-ce33-7def-c0f8-86bd5ea4d9b3"
} | {
"account_age_days": 1593,
"account_id": "ACCT-9DF4354F5CB5",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_3",
"session_entropy": 0.517
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 249,
"timestamp": "2026-01-01T01:28:00Z",
"transaction_amount_usd": 24.75
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.507,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 264114.31,
"financial_exposure_usd": 429756.97,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104585",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "medium",
"timestamp": "2026-01-04T04:25:00Z",
"trace_id": "038bc8e2-f518-d171-125d-59de82bce7a0"
} | {
"account_age_days": 763,
"account_id": "ACCT-B94E0E9D8A2C",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 578,
"timestamp": "2026-01-04T04:25:00Z",
"transaction_amount_usd": 2510783.16
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.446,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4677834.66,
"financial_exposure_usd": 6969287.28,
"recoverable_pct": 0.855
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102088",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "high",
"timestamp": "2026-01-02T10:48:00Z",
"trace_id": "213da461-723a-40aa-2ee7-ed5e737203ec"
} | {
"account_age_days": 792,
"account_id": "ACCT-69BBA3AB913C",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 979,
"timestamp": "2026-01-02T10:48:00Z",
"transaction_amount_usd": 69116.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 372128.85,
"financial_exposure_usd": 834087,
"recoverable_pct": 0.541
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105143",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "critical",
"timestamp": "2026-01-04T13:43:00Z",
"trace_id": "4724c1ba-8a51-9a9f-4e8d-1e23f70d1f09"
} | {
"account_age_days": 1847,
"account_id": "ACCT-9DCC6F6C21E3",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 202,
"timestamp": "2026-01-04T13:43:00Z",
"transaction_amount_usd": 493248.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.581,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2375680.13,
"financial_exposure_usd": 3070676.11,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101640",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-02T03:20:00Z",
"trace_id": "8028b2d4-7d30-6f0c-023d-1651474f59f6"
} | {
"account_age_days": 1880,
"account_id": "ACCT-02B94DF8679D",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_1",
"session_entropy": 0.888
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1028,
"timestamp": "2026-01-02T03:20:00Z",
"transaction_amount_usd": 116536.33
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 332754.15,
"financial_exposure_usd": 678414.17,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107786",
"label": "benign",
"label_confidence": 0.548,
"severity": "low",
"timestamp": "2026-01-06T09:46:00Z",
"trace_id": "b3bcd65f-1156-bf17-8233-f5098404a9ea"
} | {
"account_age_days": 123,
"account_id": "ACCT-502C6BEF4476",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_2",
"session_entropy": 0.493
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 160,
"timestamp": "2026-01-06T02:37:00Z",
"transaction_amount_usd": 5.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 990.29,
"financial_exposure_usd": 1505.74,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104384",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-04T01:04:00Z",
"trace_id": "2ecc8d70-3fb1-5a72-2714-792c11f9d2a7"
} | {
"account_age_days": 1521,
"account_id": "ACCT-157577529C9C",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.794
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 666,
"timestamp": "2026-01-04T01:04:00Z",
"transaction_amount_usd": 1067634.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3543833.6,
"financial_exposure_usd": 6210589.93,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101691",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-02T04:11:00Z",
"trace_id": "aae9fa25-7df8-1e95-b79f-0320ee56066a"
} | {
"account_age_days": 224,
"account_id": "ACCT-965644D0EDBD",
"baseline_risk_score": 0.603,
"kyc_tier": "tier_1",
"session_entropy": 0.866
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 987,
"timestamp": "2026-01-02T04:11:00Z",
"transaction_amount_usd": 48956.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 707704.44,
"financial_exposure_usd": 918195.82,
"recoverable_pct": 0.377
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105901",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "low",
"timestamp": "2026-01-05T02:21:00Z",
"trace_id": "28883a19-4213-1225-9f8a-a6c6ec8166a6"
} | {
"account_age_days": 1845,
"account_id": "ACCT-F42374357EC6",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 623,
"timestamp": "2026-01-05T02:21:00Z",
"transaction_amount_usd": 408540.44
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.95,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3076703.84,
"financial_exposure_usd": 3743086.31,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109724",
"label": "benign",
"label_confidence": 0.613,
"severity": "low",
"timestamp": "2026-01-07T18:04:00Z",
"trace_id": "88ccd2a1-127b-d478-b7d7-0fa55cbd2795"
} | {
"account_age_days": 1552,
"account_id": "ACCT-CC4227AB3CFF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.463
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 127,
"timestamp": "2026-01-07T16:41:00Z",
"transaction_amount_usd": 9.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 734,
"financial_exposure_usd": 1554.03,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101320",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-01T22:00:00Z",
"trace_id": "eb751576-de41-51e6-7c00-5a78d5a28c3d"
} | {
"account_age_days": 268,
"account_id": "ACCT-6D883D8F3762",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1171,
"timestamp": "2026-01-01T22:00:00Z",
"transaction_amount_usd": 67713.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.724,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 829139.94,
"financial_exposure_usd": 946579.99,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109087",
"label": "benign",
"label_confidence": 0.611,
"severity": "high",
"timestamp": "2026-01-07T07:27:00Z",
"trace_id": "ec7a14e9-84eb-3d68-b8af-6389006bb83b"
} | {
"account_age_days": 1624,
"account_id": "ACCT-78A579E63D4D",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.356
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 246,
"timestamp": "2026-01-07T06:04:00Z",
"transaction_amount_usd": 7.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.56,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4882.79,
"financial_exposure_usd": 5024.36,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107521",
"label": "benign",
"label_confidence": 0.461,
"severity": "low",
"timestamp": "2026-01-06T05:21:00Z",
"trace_id": "74b03e1b-38ab-488c-a5f2-0a83268da459"
} | {
"account_age_days": 6,
"account_id": "ACCT-852B3E1B6EAA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.132
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 195,
"timestamp": "2026-01-06T05:21:00Z",
"transaction_amount_usd": 2382.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6198.98,
"financial_exposure_usd": 6901.45,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107018",
"label": "benign",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-05T20:58:00Z",
"trace_id": "69004563-ebbc-fa63-6efe-7d0577d5538d"
} | {
"account_age_days": 1441,
"account_id": "ACCT-A9118A16F3BA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.692
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 833,
"timestamp": "2026-01-05T20:58:00Z",
"transaction_amount_usd": 13488.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.637,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4564.18,
"financial_exposure_usd": 6838.16,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105308",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "high",
"timestamp": "2026-01-04T16:28:00Z",
"trace_id": "7fdf54c0-15c2-bce7-27e4-9d47137413fe"
} | {
"account_age_days": 1008,
"account_id": "ACCT-3E859296505E",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_1",
"session_entropy": 0.666
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 329,
"timestamp": "2026-01-04T13:10:00Z",
"transaction_amount_usd": 4.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.762,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2447338.55,
"financial_exposure_usd": 3605939.63,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103138",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "critical",
"timestamp": "2026-01-03T04:18:00Z",
"trace_id": "6c0d41cc-482d-6cf1-9a82-621dcb2b66d8"
} | {
"account_age_days": 1756,
"account_id": "ACCT-11DDAFEC254F",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_1",
"session_entropy": 0.614
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1138,
"timestamp": "2026-01-03T04:18:00Z",
"transaction_amount_usd": 85686.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 522624.49,
"financial_exposure_usd": 669986.57,
"recoverable_pct": 0.331
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103340",
"label": "fraudulent",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-03T07:40:00Z",
"trace_id": "7262d897-c4cb-8315-4c00-b399bab8bcd7"
} | {
"account_age_days": 1128,
"account_id": "ACCT-4998BBCC2620",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 628,
"timestamp": "2026-01-03T07:40:00Z",
"transaction_amount_usd": 1704537.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.783,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3328587.71,
"financial_exposure_usd": 4486172.05,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103876",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "low",
"timestamp": "2026-01-03T16:36:00Z",
"trace_id": "b5415304-9022-b7eb-6691-8a5f85e6a5ce"
} | {
"account_age_days": 953,
"account_id": "ACCT-6A6B8C5D6388",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_2",
"session_entropy": 0.552
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 338,
"timestamp": "2026-01-03T16:36:00Z",
"transaction_amount_usd": 2556391
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1939671.67,
"financial_exposure_usd": 3833595.26,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105281",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "critical",
"timestamp": "2026-01-04T16:01:00Z",
"trace_id": "ad1fa45b-f2a0-2f63-df22-60943cd3a980"
} | {
"account_age_days": 602,
"account_id": "ACCT-4A85A569995C",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.229
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 669,
"timestamp": "2026-01-04T16:01:00Z",
"transaction_amount_usd": 1729746.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.813,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4739934.81,
"financial_exposure_usd": 5217581.41,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101308",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-01T21:48:00Z",
"trace_id": "b8d8b1be-3a9f-18ad-8e80-54d411c3115c"
} | {
"account_age_days": 328,
"account_id": "ACCT-12CD6A6E8362",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_1",
"session_entropy": 0.922
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 558,
"timestamp": "2026-01-01T21:48:00Z",
"transaction_amount_usd": 101451.71
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 128991.76,
"financial_exposure_usd": 217802.01,
"recoverable_pct": 0.211
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101385",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "high",
"timestamp": "2026-01-01T23:05:00Z",
"trace_id": "e2dcc410-068e-96b3-6fdd-9984193bb884"
} | {
"account_age_days": 1340,
"account_id": "ACCT-DAFCE10EE3B3",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 954,
"timestamp": "2026-01-01T23:05:00Z",
"transaction_amount_usd": 15754.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.379,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 701780.16,
"financial_exposure_usd": 880559.89,
"recoverable_pct": 0.126
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100168",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "critical",
"timestamp": "2026-01-01T02:48:00Z",
"trace_id": "975aae69-e970-7c9e-266a-8b90ee28b2f4"
} | {
"account_age_days": 1865,
"account_id": "ACCT-89A1321DECFB",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_2",
"session_entropy": 0.308
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 377,
"timestamp": "2026-01-01T02:03:00Z",
"transaction_amount_usd": 17.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.75,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 825365.49,
"financial_exposure_usd": 940572.91,
"recoverable_pct": 0.29
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108339",
"label": "benign",
"label_confidence": 0.739,
"severity": "low",
"timestamp": "2026-01-06T18:59:00Z",
"trace_id": "dee81293-b1f4-bed9-af78-fdf471f1eacb"
} | {
"account_age_days": 175,
"account_id": "ACCT-5594A6F5ADB0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.512
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 213,
"timestamp": "2026-01-06T18:59:00Z",
"transaction_amount_usd": 4144.71
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1870.5,
"financial_exposure_usd": 2034.98,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100152",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-01T02:32:00Z",
"trace_id": "eaaa94c8-a097-efe3-c31d-b215d7d0dc99"
} | {
"account_age_days": 1300,
"account_id": "ACCT-6010AB936B7F",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.856
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 975,
"timestamp": "2026-01-01T02:32:00Z",
"transaction_amount_usd": 19506.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 654389.02,
"financial_exposure_usd": 694545.63,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100558",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "critical",
"timestamp": "2026-01-01T09:18:00Z",
"trace_id": "b089f049-d8c4-a94e-1e28-7544069abef6"
} | {
"account_age_days": 1545,
"account_id": "ACCT-E9F644600FFC",
"baseline_risk_score": 0.467,
"kyc_tier": "tier_2",
"session_entropy": 0.206
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 209,
"timestamp": "2026-01-01T09:18:00Z",
"transaction_amount_usd": 16087.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 625058.35,
"financial_exposure_usd": 712368.36,
"recoverable_pct": 0.342
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104612",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "medium",
"timestamp": "2026-01-04T04:52:00Z",
"trace_id": "950ac57b-b966-4063-f6b1-cf3574836308"
} | {
"account_age_days": 1033,
"account_id": "ACCT-B1597EA2322A",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_2",
"session_entropy": 0.806
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1200,
"timestamp": "2026-01-04T04:52:00Z",
"transaction_amount_usd": 2990371.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.59,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2270496.94,
"financial_exposure_usd": 2335272.81,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102141",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-02T11:41:00Z",
"trace_id": "ce463efc-1fa3-1a4e-c5c4-7b5b80222f62"
} | {
"account_age_days": 1158,
"account_id": "ACCT-F13E7832A1FF",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_3",
"session_entropy": 0.257
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 860,
"timestamp": "2026-01-02T11:41:00Z",
"transaction_amount_usd": 77954.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 522662.46,
"financial_exposure_usd": 599712.19,
"recoverable_pct": 0.32
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104453",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-04T02:13:00Z",
"trace_id": "0b752cfc-c734-3a61-ae62-7b0991811bfb"
} | {
"account_age_days": 1158,
"account_id": "ACCT-528D65BB8EF7",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.546
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 204,
"timestamp": "2026-01-03T15:25:00Z",
"transaction_amount_usd": 19.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.436,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1575838.88,
"financial_exposure_usd": 2859398.89,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101235",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "critical",
"timestamp": "2026-01-01T20:35:00Z",
"trace_id": "157199df-03e4-d27d-a612-37893df8c791"
} | {
"account_age_days": 170,
"account_id": "ACCT-9AF857390A8E",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_1",
"session_entropy": 0.381
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 273,
"timestamp": "2026-01-01T12:39:00Z",
"transaction_amount_usd": 3.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.831,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 605047.03,
"financial_exposure_usd": 1271606.34,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109881",
"label": "benign",
"label_confidence": 0.516,
"severity": "critical",
"timestamp": "2026-01-07T20:41:00Z",
"trace_id": "c140d684-be61-9841-b21b-744582aad007"
} | {
"account_age_days": 545,
"account_id": "ACCT-13E3E0FC41D1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.669
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 160,
"timestamp": "2026-01-07T11:13:00Z",
"transaction_amount_usd": 16.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.792,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1295.72,
"financial_exposure_usd": 1721.31,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100834",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-01T13:54:00Z",
"trace_id": "4a4e8666-3b85-b758-d7c2-94e25915b7f4"
} | {
"account_age_days": 1124,
"account_id": "ACCT-1E100F9BB8B0",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_3",
"session_entropy": 0.335
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 461,
"timestamp": "2026-01-01T13:54:00Z",
"transaction_amount_usd": 29179.69
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.503,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 181151.66,
"financial_exposure_usd": 404524.8,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105351",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-04T17:11:00Z",
"trace_id": "821f8fe2-f85e-dd2b-8d66-f5b4ac002aa6"
} | {
"account_age_days": 1562,
"account_id": "ACCT-01B359FC6B0B",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.932
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 913,
"timestamp": "2026-01-04T17:11:00Z",
"transaction_amount_usd": 972049.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.844,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4547683.16,
"financial_exposure_usd": 5038934.34,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107498",
"label": "benign",
"label_confidence": 0.524,
"severity": "medium",
"timestamp": "2026-01-06T04:58:00Z",
"trace_id": "47ccd5e7-f508-a823-bd78-7a7cf56e191a"
} | {
"account_age_days": 1880,
"account_id": "ACCT-11796B803828",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_2",
"session_entropy": 0.179
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 450,
"timestamp": "2026-01-06T04:58:00Z",
"transaction_amount_usd": 9786.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.459,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1228.77,
"financial_exposure_usd": 1802.34,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109614",
"label": "benign",
"label_confidence": 0.541,
"severity": "low",
"timestamp": "2026-01-07T16:14:00Z",
"trace_id": "a1ed143b-3c00-4756-bc37-a687338abc57"
} | {
"account_age_days": 705,
"account_id": "ACCT-74ABB7C1879E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.401
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1086,
"timestamp": "2026-01-07T16:14:00Z",
"transaction_amount_usd": 6346.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1538.07,
"financial_exposure_usd": 3063.91,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104179",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "high",
"timestamp": "2026-01-03T21:39:00Z",
"trace_id": "c8bed43f-59e6-d019-c4f9-0afd4d549d5a"
} | {
"account_age_days": 672,
"account_id": "ACCT-64F74449CD3C",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_2",
"session_entropy": 0.726
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 127,
"timestamp": "2026-01-03T21:39:00Z",
"transaction_amount_usd": 1327298.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.463,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2616583.54,
"financial_exposure_usd": 3707739.03,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109450",
"label": "benign",
"label_confidence": 0.701,
"severity": "high",
"timestamp": "2026-01-07T13:30:00Z",
"trace_id": "6b671b93-f36d-02c8-f14c-aeeee8ccde33"
} | {
"account_age_days": 163,
"account_id": "ACCT-047EE9F9FB53",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_1",
"session_entropy": 0.176
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 414,
"timestamp": "2026-01-07T13:30:00Z",
"transaction_amount_usd": 13937.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1393.4,
"financial_exposure_usd": 1824.17,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109285",
"label": "benign",
"label_confidence": 0.515,
"severity": "medium",
"timestamp": "2026-01-07T10:45:00Z",
"trace_id": "f8f0ee6d-8800-c9e1-2fb9-f30a8fb9b9b5"
} | {
"account_age_days": 1865,
"account_id": "ACCT-192DB1BF6FFD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.708
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1034,
"timestamp": "2026-01-07T10:45:00Z",
"transaction_amount_usd": 6607.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 94.92,
"financial_exposure_usd": 141.7,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100270",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "low",
"timestamp": "2026-01-01T04:30:00Z",
"trace_id": "e14b400f-d873-56e9-3262-188fdeafd27f"
} | {
"account_age_days": 1467,
"account_id": "ACCT-1A950F3EBD84",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 355,
"timestamp": "2026-01-01T02:11:00Z",
"transaction_amount_usd": 24.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.635,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 488911.52,
"financial_exposure_usd": 690052.85,
"recoverable_pct": 0.057
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105609",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "critical",
"timestamp": "2026-01-04T21:29:00Z",
"trace_id": "1be06f04-2fa5-0952-ec44-0c963f2f1404"
} | {
"account_age_days": 1496,
"account_id": "ACCT-175AE887DF47",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_2",
"session_entropy": 0.187
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 109,
"timestamp": "2026-01-04T21:29:00Z",
"transaction_amount_usd": 1332499.47
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2814155.78,
"financial_exposure_usd": 5272641.74,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103085",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-03T03:25:00Z",
"trace_id": "ea37ad59-d923-993e-7902-53e1138fcee7"
} | {
"account_age_days": 1426,
"account_id": "ACCT-BEC21AEFCDF1",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_3",
"session_entropy": 0.408
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1179,
"timestamp": "2026-01-03T03:25:00Z",
"transaction_amount_usd": 70808.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.629,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 402943.13,
"financial_exposure_usd": 739004.35,
"recoverable_pct": 0.183
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102280",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "critical",
"timestamp": "2026-01-02T14:00:00Z",
"trace_id": "756c7602-5e26-9964-9d62-bbb4b42efd43"
} | {
"account_age_days": 1658,
"account_id": "ACCT-E5ECA32A3983",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_1",
"session_entropy": 0.441
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 191,
"timestamp": "2026-01-02T11:38:00Z",
"transaction_amount_usd": 16.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 866028.63,
"financial_exposure_usd": 1014773.43,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101581",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-02T02:21:00Z",
"trace_id": "6148d71a-2ff3-e0b2-560d-0f8bb6b202d8"
} | {
"account_age_days": 461,
"account_id": "ACCT-33C3AB78AFAE",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_1",
"session_entropy": 0.939
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 835,
"timestamp": "2026-01-02T02:21:00Z",
"transaction_amount_usd": 118631.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.35,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 475857.79,
"financial_exposure_usd": 708825.74,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107206",
"label": "benign",
"label_confidence": 0.463,
"severity": "medium",
"timestamp": "2026-01-06T00:06:00Z",
"trace_id": "a9065b8c-3e22-478b-0ff7-ce525385f798"
} | {
"account_age_days": 1924,
"account_id": "ACCT-A4B2938BC5F7",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_3",
"session_entropy": 0.444
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 423,
"timestamp": "2026-01-06T00:06:00Z",
"transaction_amount_usd": 14475.93
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3716.96,
"financial_exposure_usd": 4576.59,
"recoverable_pct": 0.944
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104854",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-04T08:54:00Z",
"trace_id": "5ed2f225-7af7-3346-8778-5e6cc0c11110"
} | {
"account_age_days": 638,
"account_id": "ACCT-1FBBB9D537EC",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_1",
"session_entropy": 0.332
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 818,
"timestamp": "2026-01-04T08:54:00Z",
"transaction_amount_usd": 1943012.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.618,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4353394.41,
"financial_exposure_usd": 4483504.57,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104432",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "critical",
"timestamp": "2026-01-04T01:52:00Z",
"trace_id": "b70a999c-ffa8-43ee-9111-4ee223c898c7"
} | {
"account_age_days": 157,
"account_id": "ACCT-224CDC1AA7F1",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_2",
"session_entropy": 0.156
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1047,
"timestamp": "2026-01-04T01:52:00Z",
"transaction_amount_usd": 1703164.32
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.672,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3703036.45,
"financial_exposure_usd": 4260141.98,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104323",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "critical",
"timestamp": "2026-01-04T00:03:00Z",
"trace_id": "3f81553c-bcc0-a215-966a-2a5a39c6e81b"
} | {
"account_age_days": 1613,
"account_id": "ACCT-4B0EA983E607",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_3",
"session_entropy": 0.677
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 249,
"timestamp": "2026-01-04T00:03:00Z",
"transaction_amount_usd": 1824687.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2552114.17,
"financial_exposure_usd": 4322884.78,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107497",
"label": "benign",
"label_confidence": 0.724,
"severity": "low",
"timestamp": "2026-01-06T04:57:00Z",
"trace_id": "53f268b9-b5a2-c5f0-2db3-e1767d7a9039"
} | {
"account_age_days": 1436,
"account_id": "ACCT-596C7002ECA4",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_3",
"session_entropy": 0.193
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 387,
"timestamp": "2026-01-06T04:10:00Z",
"transaction_amount_usd": 24.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3603.73,
"financial_exposure_usd": 5597.69,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102117",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-02T11:17:00Z",
"trace_id": "9984269a-2d1b-f40c-8b2d-75bd823b1b83"
} | {
"account_age_days": 468,
"account_id": "ACCT-155994233B2E",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_3",
"session_entropy": 0.926
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 911,
"timestamp": "2026-01-02T11:17:00Z",
"transaction_amount_usd": 94347.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.456,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 329235.7,
"financial_exposure_usd": 633357.51,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101257",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "critical",
"timestamp": "2026-01-01T20:57:00Z",
"trace_id": "0f6c819d-4732-fbbf-41fb-bfe4e20247fe"
} | {
"account_age_days": 1002,
"account_id": "ACCT-D25736A52E99",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.779
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 108,
"timestamp": "2026-01-01T14:55:00Z",
"transaction_amount_usd": 13.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.468,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 306115.42,
"financial_exposure_usd": 339759.07,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107187",
"label": "benign",
"label_confidence": 0.622,
"severity": "low",
"timestamp": "2026-01-05T23:47:00Z",
"trace_id": "2eaea54c-9c0a-0f4c-1a47-0ef2519a6868"
} | {
"account_age_days": 1421,
"account_id": "ACCT-D22B4C9E3763",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.706
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 152,
"timestamp": "2026-01-05T23:47:00Z",
"transaction_amount_usd": 11747.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 3907.95,
"financial_exposure_usd": 6553.98,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109983",
"label": "benign",
"label_confidence": 0.51,
"severity": "low",
"timestamp": "2026-01-07T22:23:00Z",
"trace_id": "6f51f761-7781-fe04-d574-f0b8eeeff7e8"
} | {
"account_age_days": 530,
"account_id": "ACCT-4DEE89410356",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.186
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 298,
"timestamp": "2026-01-07T12:59:00Z",
"transaction_amount_usd": 6.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.629,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1673.91,
"financial_exposure_usd": 1694.38,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103325",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "medium",
"timestamp": "2026-01-03T07:25:00Z",
"trace_id": "e62f4a8f-e6c6-834f-169a-43f01a11f76b"
} | {
"account_age_days": 442,
"account_id": "ACCT-440001E0B82D",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_3",
"session_entropy": 0.913
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 207,
"timestamp": "2026-01-03T07:25:00Z",
"transaction_amount_usd": 32409.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.604,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 481006.05,
"financial_exposure_usd": 521184.07,
"recoverable_pct": 0.171
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103033",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-03T02:33:00Z",
"trace_id": "30bf8757-7bb8-4553-5f89-bd719b035c77"
} | {
"account_age_days": 598,
"account_id": "ACCT-C291A2C588FF",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_3",
"session_entropy": 0.494
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1178,
"timestamp": "2026-01-03T02:33:00Z",
"transaction_amount_usd": 11174.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.681,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 207622.68,
"financial_exposure_usd": 301434.43,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106372",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "critical",
"timestamp": "2026-01-05T10:12:00Z",
"trace_id": "9a350657-fe8e-6b11-986d-7edff6641221"
} | {
"account_age_days": 598,
"account_id": "ACCT-F08198ED4D92",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_1",
"session_entropy": 0.117
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 492,
"timestamp": "2026-01-05T10:12:00Z",
"transaction_amount_usd": 716594.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.707,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4379577.52,
"financial_exposure_usd": 5575582.36,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108184",
"label": "benign",
"label_confidence": 0.75,
"severity": "critical",
"timestamp": "2026-01-06T16:24:00Z",
"trace_id": "18fae62b-4a79-2f16-fc8d-dc522c6e5579"
} | {
"account_age_days": 1285,
"account_id": "ACCT-36CC9612121A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.473
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1066,
"timestamp": "2026-01-06T16:24:00Z",
"transaction_amount_usd": 5185.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 188.63,
"financial_exposure_usd": 196.58,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102611",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-02T19:31:00Z",
"trace_id": "8c7bccc6-1071-5293-308a-7be61753e7d1"
} | {
"account_age_days": 1952,
"account_id": "ACCT-36EE4F6A520B",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_3",
"session_entropy": 0.446
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 394,
"timestamp": "2026-01-02T15:45:00Z",
"transaction_amount_usd": 18.87
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.717,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 373021.35,
"financial_exposure_usd": 910213.36,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104194",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-03T21:54:00Z",
"trace_id": "f3c014d6-5534-736c-6121-e2d8eea064d3"
} | {
"account_age_days": 82,
"account_id": "ACCT-9B449180DA0C",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_1",
"session_entropy": 0.636
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 397,
"timestamp": "2026-01-03T13:11:00Z",
"transaction_amount_usd": 23.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2444082.4,
"financial_exposure_usd": 3578680.43,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107419",
"label": "benign",
"label_confidence": 0.699,
"severity": "medium",
"timestamp": "2026-01-06T03:39:00Z",
"trace_id": "ec8dc737-77e3-ea0f-c89f-025bc23af91e"
} | {
"account_age_days": 192,
"account_id": "ACCT-0F1AAC9DFC88",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 845,
"timestamp": "2026-01-06T03:39:00Z",
"transaction_amount_usd": 13698.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1895.55,
"financial_exposure_usd": 4442.96,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105062",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-04T12:22:00Z",
"trace_id": "457c32fa-d233-c523-557f-c72d812346b3"
} | {
"account_age_days": 1129,
"account_id": "ACCT-5EF37C8A1164",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_1",
"session_entropy": 0.155
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 558,
"timestamp": "2026-01-04T12:22:00Z",
"transaction_amount_usd": 1096646.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.528,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2714299.99,
"financial_exposure_usd": 2946385.47,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106041",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "medium",
"timestamp": "2026-01-05T04:41:00Z",
"trace_id": "bfd128de-89a3-5a7d-72d0-0de7fbbc1c55"
} | {
"account_age_days": 1076,
"account_id": "ACCT-F8C009E85FC2",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_3",
"session_entropy": 0.132
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 240,
"timestamp": "2026-01-05T02:52:00Z",
"transaction_amount_usd": 19.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2385280.84,
"financial_exposure_usd": 3890624.31,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107056",
"label": "benign",
"label_confidence": 0.477,
"severity": "medium",
"timestamp": "2026-01-05T21:36:00Z",
"trace_id": "fd49cb77-632b-417d-9503-c0ba93784f70"
} | {
"account_age_days": 115,
"account_id": "ACCT-AFB9DBCC3BF2",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_3",
"session_entropy": 0.721
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1065,
"timestamp": "2026-01-05T21:36:00Z",
"transaction_amount_usd": 13779.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.667,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1475.02,
"financial_exposure_usd": 3475.42,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101511",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-02T01:11:00Z",
"trace_id": "27880195-1e51-d369-a89e-6ee63fc56289"
} | {
"account_age_days": 1136,
"account_id": "ACCT-678FB8AF4E7F",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_3",
"session_entropy": 0.872
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 339,
"timestamp": "2026-01-01T22:18:00Z",
"transaction_amount_usd": 6.57
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 364635.03,
"financial_exposure_usd": 668044.11,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101575",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "low",
"timestamp": "2026-01-02T02:15:00Z",
"trace_id": "4b4dd19c-8f7c-ac8e-38d9-b60a70e84a92"
} | {
"account_age_days": 1235,
"account_id": "ACCT-1DFDBB2937F9",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_1",
"session_entropy": 0.246
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 273,
"timestamp": "2026-01-02T00:03:00Z",
"transaction_amount_usd": 3.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.784,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 101746.98,
"financial_exposure_usd": 157563.49,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101260",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "low",
"timestamp": "2026-01-01T21:00:00Z",
"trace_id": "c7414763-7348-4b47-c9fb-cfd6c6abccbd"
} | {
"account_age_days": 1536,
"account_id": "ACCT-8024B48D482D",
"baseline_risk_score": 0.612,
"kyc_tier": "tier_1",
"session_entropy": 0.559
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 789,
"timestamp": "2026-01-01T21:00:00Z",
"transaction_amount_usd": 107888.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.576,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 869254.63,
"financial_exposure_usd": 1092319.45,
"recoverable_pct": 0.17
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107615",
"label": "benign",
"label_confidence": 0.563,
"severity": "low",
"timestamp": "2026-01-06T06:55:00Z",
"trace_id": "d798ea69-f6af-c137-9a77-7ad3899994f2"
} | {
"account_age_days": 1413,
"account_id": "ACCT-74E7C1861A49",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_3",
"session_entropy": 0.289
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1014,
"timestamp": "2026-01-06T06:55:00Z",
"transaction_amount_usd": 14150.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1204.32,
"financial_exposure_usd": 1906.95,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108009",
"label": "benign",
"label_confidence": 0.51,
"severity": "medium",
"timestamp": "2026-01-06T13:29:00Z",
"trace_id": "8546890a-10e2-7e06-b57d-130126508755"
} | {
"account_age_days": 524,
"account_id": "ACCT-7556F2292A19",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 323,
"timestamp": "2026-01-06T13:29:00Z",
"transaction_amount_usd": 11349.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3518.65,
"financial_exposure_usd": 5023.75,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103233",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-03T05:53:00Z",
"trace_id": "8ad06588-091b-355a-7c58-24c34d31ca6b"
} | {
"account_age_days": 373,
"account_id": "ACCT-C8B51C70C1ED",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_3",
"session_entropy": 0.825
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 597,
"timestamp": "2026-01-03T05:53:00Z",
"transaction_amount_usd": 35882.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 930665,
"financial_exposure_usd": 1021067.68,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102316",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "low",
"timestamp": "2026-01-02T14:36:00Z",
"trace_id": "b6a84108-9fe6-c462-270e-f3fe839e0b94"
} | {
"account_age_days": 1855,
"account_id": "ACCT-9FDCD7638A5D",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_2",
"session_entropy": 0.124
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 515,
"timestamp": "2026-01-02T14:36:00Z",
"transaction_amount_usd": 25314.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.822,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 890579.67,
"financial_exposure_usd": 1255317.11,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106814",
"label": "benign",
"label_confidence": 0.517,
"severity": "high",
"timestamp": "2026-01-05T17:34:00Z",
"trace_id": "7e1d0ebc-5fb5-5aad-51ae-2dd22978d71b"
} | {
"account_age_days": 529,
"account_id": "ACCT-1A2DB3DEF15A",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_1",
"session_entropy": 0.492
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 474,
"timestamp": "2026-01-05T17:34:00Z",
"transaction_amount_usd": 5057.59
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1549.34,
"financial_exposure_usd": 3571.62,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108926",
"label": "benign",
"label_confidence": 0.484,
"severity": "low",
"timestamp": "2026-01-07T04:46:00Z",
"trace_id": "70809600-9334-e39e-2a24-00e0e090c480"
} | {
"account_age_days": 1535,
"account_id": "ACCT-814B19F5A269",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.934
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 100,
"timestamp": "2026-01-06T23:38:00Z",
"transaction_amount_usd": 23.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2088.84,
"financial_exposure_usd": 2583.52,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109137",
"label": "benign",
"label_confidence": 0.69,
"severity": "low",
"timestamp": "2026-01-07T08:17:00Z",
"trace_id": "3fd59862-4ffe-b4f0-4e3c-2c06eada7749"
} | {
"account_age_days": 719,
"account_id": "ACCT-F6A8CA12667C",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_1",
"session_entropy": 0.778
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1027,
"timestamp": "2026-01-07T08:17:00Z",
"transaction_amount_usd": 5120.21
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2338.48,
"financial_exposure_usd": 3314.94,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106499",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "high",
"timestamp": "2026-01-05T12:19:00Z",
"trace_id": "5061c7dc-ab23-7c05-8b31-afa60b7f9446"
} | {
"account_age_days": 1406,
"account_id": "ACCT-2A8A829C986B",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_2",
"session_entropy": 0.739
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 365,
"timestamp": "2026-01-05T12:19:00Z",
"transaction_amount_usd": 2087601.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.642,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1527559.41,
"financial_exposure_usd": 3049809.65,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101361",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-01T22:41:00Z",
"trace_id": "88c562f6-7300-3887-db91-b65f90b0fcd3"
} | {
"account_age_days": 1694,
"account_id": "ACCT-A132A3B52A54",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_2",
"session_entropy": 0.605
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 214,
"timestamp": "2026-01-01T15:38:00Z",
"transaction_amount_usd": 6.1
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.724,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 738843.28,
"financial_exposure_usd": 852244.03,
"recoverable_pct": 0.052
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100770",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-01T12:50:00Z",
"trace_id": "ca9e90b6-14e1-521c-1450-b8074e0ef21b"
} | {
"account_age_days": 258,
"account_id": "ACCT-715055A780D0",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.523
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 370,
"timestamp": "2026-01-01T05:00:00Z",
"transaction_amount_usd": 3.8
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.442,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 258350.04,
"financial_exposure_usd": 630153.51,
"recoverable_pct": 0.077
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107980",
"label": "benign",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-06T13:00:00Z",
"trace_id": "88a29418-2a0e-d895-196d-ea4f3341d63d"
} | {
"account_age_days": 147,
"account_id": "ACCT-76FFD3A61901",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.218
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 571,
"timestamp": "2026-01-06T13:00:00Z",
"transaction_amount_usd": 14613.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 771.18,
"financial_exposure_usd": 1377.11,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102180",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "critical",
"timestamp": "2026-01-02T12:20:00Z",
"trace_id": "a1998f28-9e86-0d59-94c6-35062b3a5e70"
} | {
"account_age_days": 276,
"account_id": "ACCT-656C38A78124",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_3",
"session_entropy": 0.216
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 917,
"timestamp": "2026-01-02T12:20:00Z",
"transaction_amount_usd": 10834.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.715,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 816739.43,
"financial_exposure_usd": 921612.17,
"recoverable_pct": 0.081
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102760",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-02T22:00:00Z",
"trace_id": "36b7f25b-6324-6a10-63df-bf2fae74a01b"
} | {
"account_age_days": 278,
"account_id": "ACCT-5292C1B388FA",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_1",
"session_entropy": 0.103
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 344,
"timestamp": "2026-01-02T20:08:00Z",
"transaction_amount_usd": 24.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.571,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 435731.3,
"financial_exposure_usd": 939304.97,
"recoverable_pct": 0.413
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104205",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "low",
"timestamp": "2026-01-03T22:05:00Z",
"trace_id": "3014e35a-eb14-8112-de7f-b47f69428370"
} | {
"account_age_days": 1620,
"account_id": "ACCT-FB62287B62C5",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_1",
"session_entropy": 0.657
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 397,
"timestamp": "2026-01-03T12:10:00Z",
"transaction_amount_usd": 10.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.796,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4280033.42,
"financial_exposure_usd": 5240061.73,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109546",
"label": "benign",
"label_confidence": 0.53,
"severity": "medium",
"timestamp": "2026-01-07T15:06:00Z",
"trace_id": "9ff51a43-0818-93d1-ec23-10d04805b796"
} | {
"account_age_days": 1693,
"account_id": "ACCT-974F36BD176E",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_1",
"session_entropy": 0.858
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1093,
"timestamp": "2026-01-07T15:06:00Z",
"transaction_amount_usd": 12477.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.721,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1295.24,
"financial_exposure_usd": 1629.71,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109100",
"label": "benign",
"label_confidence": 0.499,
"severity": "low",
"timestamp": "2026-01-07T07:40:00Z",
"trace_id": "d7d02e5b-e6a2-e86f-1671-1ae3af75053c"
} | {
"account_age_days": 509,
"account_id": "ACCT-B0E74C8950DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.779
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1138,
"timestamp": "2026-01-07T07:40:00Z",
"transaction_amount_usd": 14057.94
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1558.45,
"financial_exposure_usd": 2525.75,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100986",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "high",
"timestamp": "2026-01-01T16:26:00Z",
"trace_id": "3e5d9f2a-366e-b52b-65bf-a0d1037d94a7"
} | {
"account_age_days": 1418,
"account_id": "ACCT-EE4E8CF15406",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_1",
"session_entropy": 0.565
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 945,
"timestamp": "2026-01-01T16:26:00Z",
"transaction_amount_usd": 61296.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 689820.46,
"financial_exposure_usd": 724320.18,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101022",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "critical",
"timestamp": "2026-01-01T17:02:00Z",
"trace_id": "18316028-a3d9-b386-d14c-ec16bf365ea0"
} | {
"account_age_days": 1599,
"account_id": "ACCT-7EDDB12B154A",
"baseline_risk_score": 0.577,
"kyc_tier": "tier_3",
"session_entropy": 0.894
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 386,
"timestamp": "2026-01-01T16:00:00Z",
"transaction_amount_usd": 22.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.798,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1183587.18,
"financial_exposure_usd": 1188993.75,
"recoverable_pct": 0.008
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102457",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-02T16:57:00Z",
"trace_id": "2287d035-4eda-7fd2-edc5-e2b5cf9e13a6"
} | {
"account_age_days": 1014,
"account_id": "ACCT-14CF89D5E78E",
"baseline_risk_score": 0.627,
"kyc_tier": "tier_2",
"session_entropy": 0.784
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 172,
"timestamp": "2026-01-02T10:10:00Z",
"transaction_amount_usd": 11.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.659,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 561880.54,
"financial_exposure_usd": 749410.8,
"recoverable_pct": 0.154
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101488",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "high",
"timestamp": "2026-01-02T00:48:00Z",
"trace_id": "4bb539b9-27d9-5f22-6ccb-53aeddcfbd70"
} | {
"account_age_days": 1284,
"account_id": "ACCT-419F5D673E22",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_1",
"session_entropy": 0.672
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 319,
"timestamp": "2026-01-02T00:48:00Z",
"transaction_amount_usd": 62524.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.576,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 365352.51,
"financial_exposure_usd": 824956.46,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107469",
"label": "benign",
"label_confidence": 0.74,
"severity": "high",
"timestamp": "2026-01-06T04:29:00Z",
"trace_id": "d58cfd88-861a-2592-8d91-2d9fd2d69d88"
} | {
"account_age_days": 1437,
"account_id": "ACCT-F2A46BD9FEDE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.229
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 255,
"timestamp": "2026-01-06T01:15:00Z",
"transaction_amount_usd": 21.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5135.55,
"financial_exposure_usd": 5502.52,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101736",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-02T04:56:00Z",
"trace_id": "f580e05e-3411-2977-4bb6-98c1448fa8d4"
} | {
"account_age_days": 1703,
"account_id": "ACCT-4986608E8613",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_3",
"session_entropy": 0.422
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 462,
"timestamp": "2026-01-02T04:56:00Z",
"transaction_amount_usd": 30620.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.356,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 660896.99,
"financial_exposure_usd": 850806.58,
"recoverable_pct": 0.393
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103603",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "medium",
"timestamp": "2026-01-03T12:03:00Z",
"trace_id": "314579e1-4d1e-f882-fb4d-e06e45e7bf08"
} | {
"account_age_days": 1418,
"account_id": "ACCT-7CFF894320FC",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_2",
"session_entropy": 0.503
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1100,
"timestamp": "2026-01-03T12:03:00Z",
"transaction_amount_usd": 2404548.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2205303.91,
"financial_exposure_usd": 4716782.57,
"recoverable_pct": 0.925
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.