schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102526",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "critical",
"timestamp": "2026-01-02T18:06:00Z",
"trace_id": "24b3fcf4-8ebb-abcd-df13-faf493ada33b"
} | {
"account_age_days": 293,
"account_id": "ACCT-2FC504979654",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_3",
"session_entropy": 0.376
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 336,
"timestamp": "2026-01-02T12:17:00Z",
"transaction_amount_usd": 10.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.63,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 409353.41,
"financial_exposure_usd": 541003,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105750",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-04T23:50:00Z",
"trace_id": "7de461d0-d361-30bc-a17c-cbd523d4c8db"
} | {
"account_age_days": 1667,
"account_id": "ACCT-DAC3B3C068FD",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_1",
"session_entropy": 0.174
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 796,
"timestamp": "2026-01-04T23:50:00Z",
"transaction_amount_usd": 220711.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.823,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 797916.02,
"financial_exposure_usd": 1948592.87,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103444",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-03T09:24:00Z",
"trace_id": "43f60230-d876-aa70-42a1-c6b147fcef83"
} | {
"account_age_days": 155,
"account_id": "ACCT-9E6EBD46CAEF",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_1",
"session_entropy": 0.522
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1162,
"timestamp": "2026-01-03T09:24:00Z",
"transaction_amount_usd": 2866902.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1283604.24,
"financial_exposure_usd": 2414693.37,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101046",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "critical",
"timestamp": "2026-01-01T17:26:00Z",
"trace_id": "febd2f23-2670-1a88-cc5b-b2d11fc3a419"
} | {
"account_age_days": 1749,
"account_id": "ACCT-3B9B1B260E03",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.182
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1096,
"timestamp": "2026-01-01T17:26:00Z",
"transaction_amount_usd": 111461.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.656,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 703392.89,
"financial_exposure_usd": 1294722.77,
"recoverable_pct": 0.001
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104737",
"label": "fraudulent",
"label_confidence": 0.693,
"severity": "high",
"timestamp": "2026-01-04T06:57:00Z",
"trace_id": "36ee6469-9e17-bf84-6535-049f0f4edd7e"
} | {
"account_age_days": 757,
"account_id": "ACCT-AF10435BE622",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_1",
"session_entropy": 0.937
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 744,
"timestamp": "2026-01-04T06:57:00Z",
"transaction_amount_usd": 909819.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4633396.22,
"financial_exposure_usd": 5073817.03,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102033",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-02T09:53:00Z",
"trace_id": "37cf2afc-0634-c607-842f-12337533b7d6"
} | {
"account_age_days": 1791,
"account_id": "ACCT-29BF429598D3",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.761
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 900,
"timestamp": "2026-01-02T09:53:00Z",
"transaction_amount_usd": 37414.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 625457.84,
"financial_exposure_usd": 788277.86,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103381",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "high",
"timestamp": "2026-01-03T08:21:00Z",
"trace_id": "5eade6c8-f288-da6b-4c23-0a8311ae8308"
} | {
"account_age_days": 1593,
"account_id": "ACCT-222F6E034435",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.554
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 314,
"timestamp": "2026-01-03T08:21:00Z",
"transaction_amount_usd": 585642.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2582993.08,
"financial_exposure_usd": 4742153.5,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104299",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-03T23:39:00Z",
"trace_id": "ddd1761b-ff03-c56e-3b99-345d11345c68"
} | {
"account_age_days": 1504,
"account_id": "ACCT-FF38BE4F704C",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_2",
"session_entropy": 0.217
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1199,
"timestamp": "2026-01-03T23:39:00Z",
"transaction_amount_usd": 824263.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2547428.62,
"financial_exposure_usd": 4188861.65,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100297",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "medium",
"timestamp": "2026-01-01T04:57:00Z",
"trace_id": "b026d60a-c82d-4afa-95be-2ff6f4ae5a44"
} | {
"account_age_days": 375,
"account_id": "ACCT-38665E813FF1",
"baseline_risk_score": 0.612,
"kyc_tier": "tier_1",
"session_entropy": 0.574
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 381,
"timestamp": "2026-01-01T04:57:00Z",
"transaction_amount_usd": 91110.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.566,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 448844.13,
"financial_exposure_usd": 916397.23,
"recoverable_pct": 0.096
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102738",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "high",
"timestamp": "2026-01-02T21:38:00Z",
"trace_id": "36aa651e-e513-d284-ff20-98c6476eacd4"
} | {
"account_age_days": 1108,
"account_id": "ACCT-D866F7670861",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_1",
"session_entropy": 0.695
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 395,
"timestamp": "2026-01-02T20:29:00Z",
"transaction_amount_usd": 21.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 706449.87,
"financial_exposure_usd": 1033710.23,
"recoverable_pct": 0.677
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108514",
"label": "benign",
"label_confidence": 0.635,
"severity": "low",
"timestamp": "2026-01-06T21:54:00Z",
"trace_id": "6cae05da-3ce4-8a15-9309-b4c138e90562"
} | {
"account_age_days": 1032,
"account_id": "ACCT-65E24C52359E",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.225
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 154,
"timestamp": "2026-01-06T21:54:00Z",
"transaction_amount_usd": 8984.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2394.39,
"financial_exposure_usd": 2566.46,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106366",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "critical",
"timestamp": "2026-01-05T10:06:00Z",
"trace_id": "c8664805-899d-297a-e91b-e4cec5788c2c"
} | {
"account_age_days": 1007,
"account_id": "ACCT-5342FF61AFA0",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_3",
"session_entropy": 0.929
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 352,
"timestamp": "2026-01-05T06:46:00Z",
"transaction_amount_usd": 18.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.437,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4562005.34,
"financial_exposure_usd": 8530564.41,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107810",
"label": "benign",
"label_confidence": 0.558,
"severity": "low",
"timestamp": "2026-01-06T10:10:00Z",
"trace_id": "05b98ce6-673a-9be2-eb11-da2f3a00afac"
} | {
"account_age_days": 1614,
"account_id": "ACCT-4FA771DBEBC5",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_2",
"session_entropy": 0.589
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 297,
"timestamp": "2026-01-06T08:05:00Z",
"transaction_amount_usd": 5.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.601,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1963.36,
"financial_exposure_usd": 3323.86,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109895",
"label": "benign",
"label_confidence": 0.485,
"severity": "low",
"timestamp": "2026-01-07T20:55:00Z",
"trace_id": "af18c9ac-b095-d8c8-7d08-4dc33bc4e379"
} | {
"account_age_days": 1442,
"account_id": "ACCT-534398FACE7B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.401
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 385,
"timestamp": "2026-01-07T12:06:00Z",
"transaction_amount_usd": 23.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 485.5,
"financial_exposure_usd": 905.83,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100853",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "high",
"timestamp": "2026-01-01T14:13:00Z",
"trace_id": "f381cad2-a266-5da1-0c26-ce69202cc27e"
} | {
"account_age_days": 439,
"account_id": "ACCT-661EF2CCCB5A",
"baseline_risk_score": 0.54,
"kyc_tier": "tier_3",
"session_entropy": 0.367
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 239,
"timestamp": "2026-01-01T14:13:00Z",
"transaction_amount_usd": 11665.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.928,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 379618.36,
"financial_exposure_usd": 518266.31,
"recoverable_pct": 0.085
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102013",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "critical",
"timestamp": "2026-01-02T09:33:00Z",
"trace_id": "d135232c-ee30-4306-831b-af1fd6da977c"
} | {
"account_age_days": 1936,
"account_id": "ACCT-3F7FE9AC2581",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_2",
"session_entropy": 0.782
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 703,
"timestamp": "2026-01-02T09:33:00Z",
"transaction_amount_usd": 74498.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 494423.11,
"financial_exposure_usd": 499015.75,
"recoverable_pct": 0.216
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106279",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-05T08:39:00Z",
"trace_id": "5123a30c-bd42-248f-2672-1b44f90f3b8d"
} | {
"account_age_days": 1742,
"account_id": "ACCT-EA4CD1D5F9BD",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_3",
"session_entropy": 0.903
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 768,
"timestamp": "2026-01-05T08:39:00Z",
"transaction_amount_usd": 2790615.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.61,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3305874.92,
"financial_exposure_usd": 5185589.78,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104149",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "medium",
"timestamp": "2026-01-03T21:09:00Z",
"trace_id": "9756f158-77fa-8212-3b83-e80e4d711e6d"
} | {
"account_age_days": 955,
"account_id": "ACCT-A907DA5721B7",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_3",
"session_entropy": 0.652
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 826,
"timestamp": "2026-01-03T21:09:00Z",
"transaction_amount_usd": 2374832.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.428,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2669614.21,
"financial_exposure_usd": 3949592.25,
"recoverable_pct": 0.67
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105812",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-05T00:52:00Z",
"trace_id": "8d94c2f9-5f20-d8a0-82ac-665992e7dd13"
} | {
"account_age_days": 71,
"account_id": "ACCT-70D82D363907",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_3",
"session_entropy": 0.237
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 471,
"timestamp": "2026-01-05T00:52:00Z",
"transaction_amount_usd": 749366.65
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.359,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5240215.42,
"financial_exposure_usd": 5927995.37,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109358",
"label": "benign",
"label_confidence": 0.598,
"severity": "medium",
"timestamp": "2026-01-07T11:58:00Z",
"trace_id": "ddbd4ffb-fd64-1dda-102f-f569d02e8406"
} | {
"account_age_days": 104,
"account_id": "ACCT-F7BAFF3327C9",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_2",
"session_entropy": 0.262
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 210,
"timestamp": "2026-01-07T03:49:00Z",
"transaction_amount_usd": 13.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5077.26,
"financial_exposure_usd": 5688.61,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105403",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "medium",
"timestamp": "2026-01-04T18:03:00Z",
"trace_id": "38c27156-fe69-0ce0-a366-44cfc8e62154"
} | {
"account_age_days": 1171,
"account_id": "ACCT-6814648340C0",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_2",
"session_entropy": 0.824
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 842,
"timestamp": "2026-01-04T18:03:00Z",
"transaction_amount_usd": 2172105.42
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.406,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4054511.59,
"financial_exposure_usd": 8172816.89,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102399",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-02T15:59:00Z",
"trace_id": "3c9f7f57-5a13-d84b-714d-e60e91595a00"
} | {
"account_age_days": 1883,
"account_id": "ACCT-3F94CC431B09",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 702,
"timestamp": "2026-01-02T15:59:00Z",
"transaction_amount_usd": 53739.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.682,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 292103.28,
"financial_exposure_usd": 725947.92,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104897",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "medium",
"timestamp": "2026-01-04T09:37:00Z",
"trace_id": "1da009f2-c973-3db5-f237-a4a79d9d39c3"
} | {
"account_age_days": 1096,
"account_id": "ACCT-0E1A9642C363",
"baseline_risk_score": 0.181,
"kyc_tier": "tier_1",
"session_entropy": 0.592
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 267,
"timestamp": "2026-01-03T21:33:00Z",
"transaction_amount_usd": 5.5
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.846,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2899290.7,
"financial_exposure_usd": 4963162.72,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103440",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-03T09:20:00Z",
"trace_id": "dba2eff2-393f-d88f-5322-e10c549e1666"
} | {
"account_age_days": 723,
"account_id": "ACCT-6DA10750DD86",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_1",
"session_entropy": 0.781
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 551,
"timestamp": "2026-01-03T09:20:00Z",
"transaction_amount_usd": 1894014.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.794,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2843357.13,
"financial_exposure_usd": 5748924.93,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102371",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-02T15:31:00Z",
"trace_id": "214ad3da-7c4d-f9c2-08ca-dcb4e356abf8"
} | {
"account_age_days": 531,
"account_id": "ACCT-7E883C86F7D9",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_3",
"session_entropy": 0.137
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 284,
"timestamp": "2026-01-02T03:30:00Z",
"transaction_amount_usd": 17.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.469,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 460937.3,
"financial_exposure_usd": 477566.63,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104954",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-04T10:34:00Z",
"trace_id": "92c44128-bb12-d54a-f731-4eb3516894a8"
} | {
"account_age_days": 904,
"account_id": "ACCT-9FC9AC7088B4",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_2",
"session_entropy": 0.606
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 494,
"timestamp": "2026-01-04T10:34:00Z",
"transaction_amount_usd": 672332.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2428753.46,
"financial_exposure_usd": 3321514.55,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108857",
"label": "benign",
"label_confidence": 0.654,
"severity": "low",
"timestamp": "2026-01-07T03:37:00Z",
"trace_id": "36d9ef35-1eae-07b1-9d3e-2712d600e12e"
} | {
"account_age_days": 421,
"account_id": "ACCT-D8DF508B2073",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_3",
"session_entropy": 0.179
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 858,
"timestamp": "2026-01-07T03:37:00Z",
"transaction_amount_usd": 3673.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.629,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4982.86,
"financial_exposure_usd": 7544.19,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105973",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "high",
"timestamp": "2026-01-05T03:33:00Z",
"trace_id": "8d7e2217-c9fc-63d9-86bd-0730f200aa2c"
} | {
"account_age_days": 91,
"account_id": "ACCT-8346FD3A5E4D",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.13
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 115,
"timestamp": "2026-01-04T22:38:00Z",
"transaction_amount_usd": 23.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.822,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1860821.66,
"financial_exposure_usd": 3637968.85,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106207",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-05T07:27:00Z",
"trace_id": "17407611-4a2f-c783-c1ce-53ac01129712"
} | {
"account_age_days": 1538,
"account_id": "ACCT-DD356B295434",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_3",
"session_entropy": 0.866
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 347,
"timestamp": "2026-01-05T01:54:00Z",
"transaction_amount_usd": 18.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.922,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1898604.27,
"financial_exposure_usd": 4608758.94,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105592",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "medium",
"timestamp": "2026-01-04T21:12:00Z",
"trace_id": "472021b3-640e-d8f5-3ab9-d4fc3723588c"
} | {
"account_age_days": 1209,
"account_id": "ACCT-377E92A5709A",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_1",
"session_entropy": 0.397
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 439,
"timestamp": "2026-01-04T21:12:00Z",
"transaction_amount_usd": 430407.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.427,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 559828.04,
"financial_exposure_usd": 813747.07,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101091",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-01T18:11:00Z",
"trace_id": "cd784178-3c90-4eda-f650-b1457c12c7bc"
} | {
"account_age_days": 449,
"account_id": "ACCT-FFCC7B27228F",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.492
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 787,
"timestamp": "2026-01-01T18:11:00Z",
"transaction_amount_usd": 97383.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.803,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 885445.71,
"financial_exposure_usd": 1096725.4,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105409",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "medium",
"timestamp": "2026-01-04T18:09:00Z",
"trace_id": "2bf90c6f-24f2-b2d3-ebbc-bc72561d7194"
} | {
"account_age_days": 1502,
"account_id": "ACCT-687E6BFCF584",
"baseline_risk_score": 0.348,
"kyc_tier": "tier_1",
"session_entropy": 0.488
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 173,
"timestamp": "2026-01-04T18:09:00Z",
"transaction_amount_usd": 2524856.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.868,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2690329.2,
"financial_exposure_usd": 6254286.3,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107006",
"label": "benign",
"label_confidence": 0.619,
"severity": "low",
"timestamp": "2026-01-05T20:46:00Z",
"trace_id": "b5b239a6-bd8a-1a11-a390-b637fc84e24b"
} | {
"account_age_days": 1879,
"account_id": "ACCT-D75A75560B74",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.415
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 104,
"timestamp": "2026-01-05T13:07:00Z",
"transaction_amount_usd": 22.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 4059.81,
"financial_exposure_usd": 4646.24,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107075",
"label": "benign",
"label_confidence": 0.734,
"severity": "critical",
"timestamp": "2026-01-05T21:55:00Z",
"trace_id": "3434e61b-d02e-97c1-5949-67da9ca12942"
} | {
"account_age_days": 596,
"account_id": "ACCT-9EAF42EAC852",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_1",
"session_entropy": 0.239
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 754,
"timestamp": "2026-01-05T21:55:00Z",
"transaction_amount_usd": 12750.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 663.68,
"financial_exposure_usd": 1373.18,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106972",
"label": "benign",
"label_confidence": 0.525,
"severity": "high",
"timestamp": "2026-01-05T20:12:00Z",
"trace_id": "c7368045-ac0f-edce-ad18-81f39c0200c8"
} | {
"account_age_days": 1160,
"account_id": "ACCT-668500B4717B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.389
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1068,
"timestamp": "2026-01-05T20:12:00Z",
"transaction_amount_usd": 9140.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1313.82,
"financial_exposure_usd": 1423.83,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104550",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-04T03:50:00Z",
"trace_id": "7cb746db-2283-1fd5-a27c-8a0430edcfe2"
} | {
"account_age_days": 1405,
"account_id": "ACCT-B5C42D458494",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_2",
"session_entropy": 0.288
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 519,
"timestamp": "2026-01-04T03:50:00Z",
"transaction_amount_usd": 57484.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.501,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1906005.65,
"financial_exposure_usd": 3182577.51,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107307",
"label": "benign",
"label_confidence": 0.5,
"severity": "critical",
"timestamp": "2026-01-06T01:47:00Z",
"trace_id": "71d90507-3fed-e675-c41a-2baf6efd2c25"
} | {
"account_age_days": 1081,
"account_id": "ACCT-C24C8A359C1A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.664
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 264,
"timestamp": "2026-01-05T23:53:00Z",
"transaction_amount_usd": 4.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 107.79,
"financial_exposure_usd": 118.7,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109269",
"label": "benign",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-07T10:29:00Z",
"trace_id": "de3df13b-9246-43f2-1930-b0bbaff9fb90"
} | {
"account_age_days": 252,
"account_id": "ACCT-F273B1390B13",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.111
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 452,
"timestamp": "2026-01-07T10:29:00Z",
"transaction_amount_usd": 6421.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4320.14,
"financial_exposure_usd": 4452.18,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107827",
"label": "benign",
"label_confidence": 0.585,
"severity": "low",
"timestamp": "2026-01-06T10:27:00Z",
"trace_id": "b85cfb4e-fbeb-0fa7-6938-8e2c713986e5"
} | {
"account_age_days": 45,
"account_id": "ACCT-668C8E2C11FB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.256
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 110,
"timestamp": "2026-01-06T10:27:00Z",
"transaction_amount_usd": 5064.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.67,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1173.67,
"financial_exposure_usd": 2286.82,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109697",
"label": "benign",
"label_confidence": 0.577,
"severity": "medium",
"timestamp": "2026-01-07T17:37:00Z",
"trace_id": "44544836-cc25-0f66-72b8-de05178b504f"
} | {
"account_age_days": 828,
"account_id": "ACCT-A37458336F46",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.574
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 744,
"timestamp": "2026-01-07T17:37:00Z",
"transaction_amount_usd": 9250.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4232.58,
"financial_exposure_usd": 5144.94,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108442",
"label": "benign",
"label_confidence": 0.7,
"severity": "medium",
"timestamp": "2026-01-06T20:42:00Z",
"trace_id": "079d7c07-61a7-2879-866e-8f51fd757475"
} | {
"account_age_days": 441,
"account_id": "ACCT-8A28063F9D4C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.809
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 664,
"timestamp": "2026-01-06T20:42:00Z",
"transaction_amount_usd": 2844.49
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 680.06,
"financial_exposure_usd": 1393.14,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105258",
"label": "fraudulent",
"label_confidence": 0.631,
"severity": "critical",
"timestamp": "2026-01-04T15:38:00Z",
"trace_id": "46fb3fe8-3944-7f77-b774-c2a9e5f833b6"
} | {
"account_age_days": 582,
"account_id": "ACCT-1EF85A90A318",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_3",
"session_entropy": 0.405
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 673,
"timestamp": "2026-01-04T15:38:00Z",
"transaction_amount_usd": 702783.04
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3292535.43,
"financial_exposure_usd": 5942448.99,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103797",
"label": "fraudulent",
"label_confidence": 0.614,
"severity": "medium",
"timestamp": "2026-01-03T15:17:00Z",
"trace_id": "578a9ecc-1a14-394d-d9f3-b5d38e678033"
} | {
"account_age_days": 1908,
"account_id": "ACCT-1B59B6D1E773",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_1",
"session_entropy": 0.924
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 253,
"timestamp": "2026-01-03T06:51:00Z",
"transaction_amount_usd": 10.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.725,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2206755.51,
"financial_exposure_usd": 3267697.71,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100244",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-01T04:04:00Z",
"trace_id": "4667b057-7387-de41-3d79-f8b612d0ff7d"
} | {
"account_age_days": 1152,
"account_id": "ACCT-7C3AAA22D8F1",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 682,
"timestamp": "2026-01-01T04:04:00Z",
"transaction_amount_usd": 9670.98
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.723,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 230947.96,
"financial_exposure_usd": 402179.86,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105662",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "low",
"timestamp": "2026-01-04T22:22:00Z",
"trace_id": "b0d5d2f2-2c5e-fb3a-9e21-d66747f4c86c"
} | {
"account_age_days": 1468,
"account_id": "ACCT-6B9102E736B9",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.69
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 323,
"timestamp": "2026-01-04T17:39:00Z",
"transaction_amount_usd": 25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.757,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5223655.04,
"financial_exposure_usd": 6756583.66,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101795",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-02T05:55:00Z",
"trace_id": "e7530425-bb37-0745-bae7-b6351f9b251d"
} | {
"account_age_days": 538,
"account_id": "ACCT-F41525F741DC",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_1",
"session_entropy": 0.141
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 274,
"timestamp": "2026-01-01T23:43:00Z",
"transaction_amount_usd": 15.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.479,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 516587.34,
"financial_exposure_usd": 540715.32,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103265",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "medium",
"timestamp": "2026-01-03T06:25:00Z",
"trace_id": "3d13f8db-ce57-852b-2971-ab7e723beefd"
} | {
"account_age_days": 495,
"account_id": "ACCT-26E82D04FC3A",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_2",
"session_entropy": 0.495
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 193,
"timestamp": "2026-01-03T04:10:00Z",
"transaction_amount_usd": 8.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.673,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 385437.15,
"financial_exposure_usd": 960478.34,
"recoverable_pct": 0.263
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100050",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-01T00:50:00Z",
"trace_id": "1d91fe39-d801-4004-793b-ed1b14f9c394"
} | {
"account_age_days": 1687,
"account_id": "ACCT-AEE14F87FCFF",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_3",
"session_entropy": 0.47
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1194,
"timestamp": "2026-01-01T00:50:00Z",
"transaction_amount_usd": 56777.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.85,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 614563.38,
"financial_exposure_usd": 1038377.45,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100824",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "high",
"timestamp": "2026-01-01T13:44:00Z",
"trace_id": "6fcb9bf5-40e3-0fab-a395-9d2eebb4b1ec"
} | {
"account_age_days": 648,
"account_id": "ACCT-715E280A4107",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_2",
"session_entropy": 0.928
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 796,
"timestamp": "2026-01-01T13:44:00Z",
"transaction_amount_usd": 94108.46
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.618,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 395535.5,
"financial_exposure_usd": 721833.34,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100076",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "high",
"timestamp": "2026-01-01T01:16:00Z",
"trace_id": "4199322e-3ba5-8126-3ff6-9f4195082801"
} | {
"account_age_days": 1076,
"account_id": "ACCT-9DB1F7F98FA8",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_1",
"session_entropy": 0.948
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 327,
"timestamp": "2025-12-31T19:35:00Z",
"transaction_amount_usd": 18.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.393,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 427092.24,
"financial_exposure_usd": 718953.64,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106401",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-05T10:41:00Z",
"trace_id": "140b7274-5782-0e53-0200-42d2f8aa4899"
} | {
"account_age_days": 1672,
"account_id": "ACCT-D7EB268BE8BD",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1088,
"timestamp": "2026-01-05T10:41:00Z",
"transaction_amount_usd": 138771.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.696,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2497432.96,
"financial_exposure_usd": 4180345.29,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106761",
"label": "benign",
"label_confidence": 0.501,
"severity": "low",
"timestamp": "2026-01-05T16:41:00Z",
"trace_id": "95bacc07-1feb-61e3-1f56-6664117582d3"
} | {
"account_age_days": 441,
"account_id": "ACCT-0642F9A81D03",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.93
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 936,
"timestamp": "2026-01-05T16:41:00Z",
"transaction_amount_usd": 9385.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4161.83,
"financial_exposure_usd": 4449.77,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101470",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-02T00:30:00Z",
"trace_id": "3b302916-3ded-83f9-0cae-3b0d47ed5cbd"
} | {
"account_age_days": 840,
"account_id": "ACCT-1470E9A8BF25",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_1",
"session_entropy": 0.401
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 995,
"timestamp": "2026-01-02T00:30:00Z",
"transaction_amount_usd": 71280.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 876413,
"financial_exposure_usd": 1301603.29,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106486",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "medium",
"timestamp": "2026-01-05T12:06:00Z",
"trace_id": "0be7290f-7bad-afa5-3a2c-98b318b60ab6"
} | {
"account_age_days": 1308,
"account_id": "ACCT-33F8D4AE511E",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.404
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1158,
"timestamp": "2026-01-05T12:06:00Z",
"transaction_amount_usd": 775810.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3956954.01,
"financial_exposure_usd": 4121478.72,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104498",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "low",
"timestamp": "2026-01-04T02:58:00Z",
"trace_id": "96434caf-4d41-e822-96a1-b21086eb5fcf"
} | {
"account_age_days": 1563,
"account_id": "ACCT-58106B12D834",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.571
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 214,
"timestamp": "2026-01-04T02:58:00Z",
"transaction_amount_usd": 2247478.68
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1182129.83,
"financial_exposure_usd": 1511136.26,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103750",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-03T14:30:00Z",
"trace_id": "562005df-9bf7-6917-ba34-ee5f76769ea4"
} | {
"account_age_days": 451,
"account_id": "ACCT-2AF89A8442F2",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_3",
"session_entropy": 0.652
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 119,
"timestamp": "2026-01-03T03:44:00Z",
"transaction_amount_usd": 24.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.612,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 8024990.83,
"financial_exposure_usd": 8660934.12,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101590",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "low",
"timestamp": "2026-01-02T02:30:00Z",
"trace_id": "124d456f-0e85-d962-c6ef-1b22e011df11"
} | {
"account_age_days": 264,
"account_id": "ACCT-061DE7C08CEA",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_1",
"session_entropy": 0.215
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 778,
"timestamp": "2026-01-02T02:30:00Z",
"transaction_amount_usd": 94234.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.656,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 669457.71,
"financial_exposure_usd": 1368539.85,
"recoverable_pct": 0.136
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109626",
"label": "benign",
"label_confidence": 0.737,
"severity": "low",
"timestamp": "2026-01-07T16:26:00Z",
"trace_id": "0f77a340-f9a4-b5ac-468f-67c9f230c541"
} | {
"account_age_days": 1535,
"account_id": "ACCT-9D20B8DB8C55",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.34
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 601,
"timestamp": "2026-01-07T16:26:00Z",
"transaction_amount_usd": 4269.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1019.56,
"financial_exposure_usd": 2263.3,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109123",
"label": "benign",
"label_confidence": 0.588,
"severity": "low",
"timestamp": "2026-01-07T08:03:00Z",
"trace_id": "b9b0bcb6-ca45-0928-31ab-dfe34ef4ca31"
} | {
"account_age_days": 700,
"account_id": "ACCT-1B865EE6D249",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.928
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 318,
"timestamp": "2026-01-07T02:21:00Z",
"transaction_amount_usd": 0.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1669.4,
"financial_exposure_usd": 2648.88,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103268",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "high",
"timestamp": "2026-01-03T06:28:00Z",
"trace_id": "7540495e-686c-33b3-e247-114bbf966408"
} | {
"account_age_days": 1938,
"account_id": "ACCT-0C2D56A57400",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_1",
"session_entropy": 0.94
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 955,
"timestamp": "2026-01-03T06:28:00Z",
"transaction_amount_usd": 111576.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.687,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 720144.66,
"financial_exposure_usd": 1496862.19,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100561",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "medium",
"timestamp": "2026-01-01T09:21:00Z",
"trace_id": "7a619123-551b-6e87-9150-23bafddb3f2b"
} | {
"account_age_days": 159,
"account_id": "ACCT-BD7A7C645304",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.267
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 400,
"timestamp": "2025-12-31T21:55:00Z",
"transaction_amount_usd": 17.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.405,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 381934.81,
"financial_exposure_usd": 594264.99,
"recoverable_pct": 0.255
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105481",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-04T19:21:00Z",
"trace_id": "b4da9ebf-0ec0-1480-48cd-a25f5f93b705"
} | {
"account_age_days": 1084,
"account_id": "ACCT-6F9BD576DFD5",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.625
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 265,
"timestamp": "2026-01-04T19:21:00Z",
"transaction_amount_usd": 1017088.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.415,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2630760.52,
"financial_exposure_usd": 5609387.26,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108769",
"label": "benign",
"label_confidence": 0.552,
"severity": "medium",
"timestamp": "2026-01-07T02:09:00Z",
"trace_id": "b3713f44-a8ed-f082-34e3-f701cc8ed071"
} | {
"account_age_days": 1873,
"account_id": "ACCT-7AE0A2D7142E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.8
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 933,
"timestamp": "2026-01-07T02:09:00Z",
"transaction_amount_usd": 6188.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2299.44,
"financial_exposure_usd": 2301.51,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109538",
"label": "benign",
"label_confidence": 0.451,
"severity": "low",
"timestamp": "2026-01-07T14:58:00Z",
"trace_id": "51a4d0d9-134e-68b2-49b3-02c3cad2ddb5"
} | {
"account_age_days": 138,
"account_id": "ACCT-EFD883B18CB3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.509
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 875,
"timestamp": "2026-01-07T14:58:00Z",
"transaction_amount_usd": 6825.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5975.16,
"financial_exposure_usd": 7063.94,
"recoverable_pct": 0.826
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109429",
"label": "benign",
"label_confidence": 0.482,
"severity": "medium",
"timestamp": "2026-01-07T13:09:00Z",
"trace_id": "3d3c8076-9a9a-c899-156e-25d64c786237"
} | {
"account_age_days": 1338,
"account_id": "ACCT-C21409F42B26",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 987,
"timestamp": "2026-01-07T13:09:00Z",
"transaction_amount_usd": 11972.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1460.01,
"financial_exposure_usd": 2533.21,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103414",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-03T08:54:00Z",
"trace_id": "8a473049-6a5a-67c8-249c-e90c8b4115c7"
} | {
"account_age_days": 1256,
"account_id": "ACCT-105D3ABE9BDC",
"baseline_risk_score": 0.244,
"kyc_tier": "tier_3",
"session_entropy": 0.122
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 944,
"timestamp": "2026-01-03T08:54:00Z",
"transaction_amount_usd": 1161460.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.817,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4397740.83,
"financial_exposure_usd": 7721354.32,
"recoverable_pct": 0.437
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105629",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "critical",
"timestamp": "2026-01-04T21:49:00Z",
"trace_id": "f2880549-90cf-4064-0190-c7c5e49b71e2"
} | {
"account_age_days": 1371,
"account_id": "ACCT-2C04CEC568B7",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.181
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1197,
"timestamp": "2026-01-04T21:49:00Z",
"transaction_amount_usd": 2020869.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4193948.38,
"financial_exposure_usd": 4452238.8,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104886",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "high",
"timestamp": "2026-01-04T09:26:00Z",
"trace_id": "a788fb46-92f5-0b3c-61fa-ac0a50eba959"
} | {
"account_age_days": 1498,
"account_id": "ACCT-A050E9AF9876",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.548
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 678,
"timestamp": "2026-01-04T09:26:00Z",
"transaction_amount_usd": 2730842.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.496,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1993156.14,
"financial_exposure_usd": 3069424.04,
"recoverable_pct": 0.771
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109864",
"label": "benign",
"label_confidence": 0.478,
"severity": "medium",
"timestamp": "2026-01-07T20:24:00Z",
"trace_id": "5cab3cba-373c-ea9f-fa26-9fd5cdc046d3"
} | {
"account_age_days": 1190,
"account_id": "ACCT-AD14C5C17C69",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_1",
"session_entropy": 0.42
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 472,
"timestamp": "2026-01-07T20:24:00Z",
"transaction_amount_usd": 13849
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 963.73,
"financial_exposure_usd": 1069.53,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103760",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-03T14:40:00Z",
"trace_id": "38081987-61eb-8bf0-6a0a-2626c7a5e1db"
} | {
"account_age_days": 450,
"account_id": "ACCT-713C244C8656",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.663
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 95,
"timestamp": "2026-01-03T02:33:00Z",
"transaction_amount_usd": 16.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4110606.55,
"financial_exposure_usd": 4631297.77,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105509",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-04T19:49:00Z",
"trace_id": "363eb35d-cf15-c0ab-fa85-ca8551f06f5a"
} | {
"account_age_days": 1579,
"account_id": "ACCT-6727F4F50207",
"baseline_risk_score": 0.246,
"kyc_tier": "tier_3",
"session_entropy": 0.166
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 229,
"timestamp": "2026-01-04T19:49:00Z",
"transaction_amount_usd": 2000420.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2450338.53,
"financial_exposure_usd": 5145088.34,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106907",
"label": "benign",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-05T19:07:00Z",
"trace_id": "126adc37-b737-2077-6012-4d6a983dfcf8"
} | {
"account_age_days": 9,
"account_id": "ACCT-4DFDC3A3F2BB",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_1",
"session_entropy": 0.479
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 410,
"timestamp": "2026-01-05T19:07:00Z",
"transaction_amount_usd": 13270.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.697,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1757.06,
"financial_exposure_usd": 4004.06,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104141",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "critical",
"timestamp": "2026-01-03T21:01:00Z",
"trace_id": "ecfd7b48-56e7-d400-0e76-9cfb0a9a9581"
} | {
"account_age_days": 572,
"account_id": "ACCT-07C94E0AC518",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.138
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 453,
"timestamp": "2026-01-03T21:01:00Z",
"transaction_amount_usd": 388677.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.619,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2188848.83,
"financial_exposure_usd": 3821503.07,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105968",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "critical",
"timestamp": "2026-01-05T03:28:00Z",
"trace_id": "43df4cf6-a634-46b6-d780-b9f5cb9d771d"
} | {
"account_age_days": 1630,
"account_id": "ACCT-DD0DABC18206",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.874
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 180,
"timestamp": "2026-01-05T01:06:00Z",
"transaction_amount_usd": 14.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.572,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1580535.65,
"financial_exposure_usd": 3405142.12,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109715",
"label": "benign",
"label_confidence": 0.505,
"severity": "low",
"timestamp": "2026-01-07T17:55:00Z",
"trace_id": "058fd0f8-fbd7-992a-239b-7fb418be173e"
} | {
"account_age_days": 300,
"account_id": "ACCT-8FBDC48C2A8D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.114
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 170,
"timestamp": "2026-01-07T09:48:00Z",
"transaction_amount_usd": 9.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2424.92,
"financial_exposure_usd": 4493.55,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106182",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "medium",
"timestamp": "2026-01-05T07:02:00Z",
"trace_id": "9f47a3c6-ba49-3d22-9d89-b0966a98dcbe"
} | {
"account_age_days": 1000,
"account_id": "ACCT-5A28ED2C3F97",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_1",
"session_entropy": 0.149
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 97,
"timestamp": "2026-01-05T07:02:00Z",
"transaction_amount_usd": 1266626.22
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.847,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1779305.05,
"financial_exposure_usd": 3288556.08,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106767",
"label": "benign",
"label_confidence": 0.493,
"severity": "critical",
"timestamp": "2026-01-05T16:47:00Z",
"trace_id": "141f9c85-69a0-7e83-4a13-3485c927f493"
} | {
"account_age_days": 1457,
"account_id": "ACCT-B16447129BBD",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.841
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1107,
"timestamp": "2026-01-05T16:47:00Z",
"transaction_amount_usd": 6200.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 924.78,
"financial_exposure_usd": 1465.5,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106304",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-05T09:04:00Z",
"trace_id": "8c8214f6-9b99-70ce-3ea4-3a9e4d6ff60d"
} | {
"account_age_days": 1715,
"account_id": "ACCT-6C6A30225D5C",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_2",
"session_entropy": 0.141
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1186,
"timestamp": "2026-01-05T09:04:00Z",
"transaction_amount_usd": 62572.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4287436.73,
"financial_exposure_usd": 4467107.85,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105929",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-05T02:49:00Z",
"trace_id": "50a38e1e-f666-a6af-d4ff-3b24201c557d"
} | {
"account_age_days": 125,
"account_id": "ACCT-63FB9DB4F69C",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 290,
"timestamp": "2026-01-05T02:49:00Z",
"transaction_amount_usd": 1297022.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4036782.84,
"financial_exposure_usd": 6255580.84,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108659",
"label": "benign",
"label_confidence": 0.582,
"severity": "medium",
"timestamp": "2026-01-07T00:19:00Z",
"trace_id": "a4ea273c-02e4-f6ca-9946-724ca594f1bd"
} | {
"account_age_days": 1057,
"account_id": "ACCT-9264AC98123E",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_1",
"session_entropy": 0.158
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 695,
"timestamp": "2026-01-07T00:19:00Z",
"transaction_amount_usd": 13716.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1256.8,
"financial_exposure_usd": 1780.6,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101650",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "low",
"timestamp": "2026-01-02T03:30:00Z",
"trace_id": "03705b6f-6bad-f6a7-f7c8-534c48e2f31c"
} | {
"account_age_days": 1025,
"account_id": "ACCT-0EC082A2BA18",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 528,
"timestamp": "2026-01-02T03:30:00Z",
"transaction_amount_usd": 34149.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.545,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 701492.28,
"financial_exposure_usd": 764715.24,
"recoverable_pct": 0.136
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102834",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "low",
"timestamp": "2026-01-02T23:14:00Z",
"trace_id": "f7f35de7-9a5a-2c34-aa7d-3f940c977029"
} | {
"account_age_days": 134,
"account_id": "ACCT-CCA0718AB7D1",
"baseline_risk_score": 0.625,
"kyc_tier": "tier_1",
"session_entropy": 0.237
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 226,
"timestamp": "2026-01-02T12:22:00Z",
"transaction_amount_usd": 17.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.657,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 632039.06,
"financial_exposure_usd": 788691.65,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106546",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "medium",
"timestamp": "2026-01-05T13:06:00Z",
"trace_id": "a66f1996-ccd2-669c-d49d-7bf8eee9ce50"
} | {
"account_age_days": 1968,
"account_id": "ACCT-478E89C2F51D",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_2",
"session_entropy": 0.925
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 512,
"timestamp": "2026-01-05T13:06:00Z",
"transaction_amount_usd": 1131189.02
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.566,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4284141.27,
"financial_exposure_usd": 7185060.92,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106600",
"label": "fraudulent",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-05T14:00:00Z",
"trace_id": "a3cea7e2-bb07-7462-7fc9-6700e4af6b9e"
} | {
"account_age_days": 485,
"account_id": "ACCT-11E71ED29AE9",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_3",
"session_entropy": 0.768
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1010,
"timestamp": "2026-01-05T14:00:00Z",
"transaction_amount_usd": 174276.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.943,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1473068.72,
"financial_exposure_usd": 2945039.6,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101291",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "medium",
"timestamp": "2026-01-01T21:31:00Z",
"trace_id": "7eaffab8-121b-64d0-d985-3d7fdf40fd53"
} | {
"account_age_days": 453,
"account_id": "ACCT-697115F1970E",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.53
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 254,
"timestamp": "2026-01-01T21:31:00Z",
"transaction_amount_usd": 28924.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.441,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 347005.66,
"financial_exposure_usd": 791616.27,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101019",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "high",
"timestamp": "2026-01-01T16:59:00Z",
"trace_id": "e90f97c0-71df-3f59-60d0-f2019d899652"
} | {
"account_age_days": 474,
"account_id": "ACCT-A483C971BEDD",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_1",
"session_entropy": 0.452
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 271,
"timestamp": "2026-01-01T16:59:00Z",
"transaction_amount_usd": 4673.18
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.36,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 98012.26,
"financial_exposure_usd": 110872.87,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107155",
"label": "benign",
"label_confidence": 0.513,
"severity": "medium",
"timestamp": "2026-01-05T23:15:00Z",
"trace_id": "2a2e9de0-fb39-ad53-d0af-ee1a1a0e40c1"
} | {
"account_age_days": 282,
"account_id": "ACCT-575ACC6F8A77",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_2",
"session_entropy": 0.244
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 189,
"timestamp": "2026-01-05T15:14:00Z",
"transaction_amount_usd": 20.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 559.88,
"financial_exposure_usd": 1384.91,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104473",
"label": "fraudulent",
"label_confidence": 0.608,
"severity": "critical",
"timestamp": "2026-01-04T02:33:00Z",
"trace_id": "4cfb6a1c-cb03-a70c-f7f8-3ad8494211ef"
} | {
"account_age_days": 880,
"account_id": "ACCT-A2414B205B41",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_3",
"session_entropy": 0.378
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 156,
"timestamp": "2026-01-04T01:30:00Z",
"transaction_amount_usd": 15.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.696,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 860246.09,
"financial_exposure_usd": 1118828.78,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107790",
"label": "benign",
"label_confidence": 0.55,
"severity": "medium",
"timestamp": "2026-01-06T09:50:00Z",
"trace_id": "030a03db-01b7-c016-856f-88e8fa5fba77"
} | {
"account_age_days": 1357,
"account_id": "ACCT-B46CA0EDCF53",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.633
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 206,
"timestamp": "2026-01-06T02:47:00Z",
"transaction_amount_usd": 19.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1096.57,
"financial_exposure_usd": 1231.57,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107701",
"label": "benign",
"label_confidence": 0.726,
"severity": "critical",
"timestamp": "2026-01-06T08:21:00Z",
"trace_id": "3e535b05-f8bf-8eb6-3815-c290143a37ec"
} | {
"account_age_days": 1021,
"account_id": "ACCT-1522826B8A23",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.563
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 870,
"timestamp": "2026-01-06T08:21:00Z",
"transaction_amount_usd": 8221.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.544,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 785.25,
"financial_exposure_usd": 1115.39,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101904",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-02T07:44:00Z",
"trace_id": "3d2edb32-00fa-d162-8307-b05fa99af659"
} | {
"account_age_days": 1553,
"account_id": "ACCT-938F38174033",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_1",
"session_entropy": 0.369
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1127,
"timestamp": "2026-01-02T07:44:00Z",
"transaction_amount_usd": 49486.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1258398.71,
"financial_exposure_usd": 1495173.06,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109370",
"label": "benign",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-07T12:10:00Z",
"trace_id": "0ab1d90e-eac8-8074-4e11-5506e42551f9"
} | {
"account_age_days": 1996,
"account_id": "ACCT-C2F3CD9D79D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.469
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 207,
"timestamp": "2026-01-07T07:15:00Z",
"transaction_amount_usd": 7.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1627.05,
"financial_exposure_usd": 1642.81,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107839",
"label": "benign",
"label_confidence": 0.469,
"severity": "low",
"timestamp": "2026-01-06T10:39:00Z",
"trace_id": "331cd6d2-a6b8-d513-f589-c88b01f9ffc6"
} | {
"account_age_days": 1955,
"account_id": "ACCT-20EA3AD564B0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.432
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 318,
"timestamp": "2026-01-06T02:02:00Z",
"transaction_amount_usd": 0.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1371.77,
"financial_exposure_usd": 2991.67,
"recoverable_pct": 0.936
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101917",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-02T07:57:00Z",
"trace_id": "95635189-b079-1844-50a7-c10db8444aa7"
} | {
"account_age_days": 1741,
"account_id": "ACCT-BBC60DCC6862",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_3",
"session_entropy": 0.642
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 194,
"timestamp": "2026-01-02T07:57:00Z",
"transaction_amount_usd": 114814.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 315235.46,
"financial_exposure_usd": 468487.22,
"recoverable_pct": 0.005
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108293",
"label": "benign",
"label_confidence": 0.454,
"severity": "medium",
"timestamp": "2026-01-06T18:13:00Z",
"trace_id": "6d4701cd-3f7b-f720-86e9-43b0dae9759d"
} | {
"account_age_days": 1200,
"account_id": "ACCT-AFC519FD5870",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_1",
"session_entropy": 0.828
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 855,
"timestamp": "2026-01-06T18:13:00Z",
"transaction_amount_usd": 12437.08
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.57,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1102.32,
"financial_exposure_usd": 2041.73,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103201",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "critical",
"timestamp": "2026-01-03T05:21:00Z",
"trace_id": "53b734dc-398b-ecb6-1d9e-902d9b50b0e0"
} | {
"account_age_days": 515,
"account_id": "ACCT-8C8BB596D453",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.641
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 204,
"timestamp": "2026-01-02T20:54:00Z",
"transaction_amount_usd": 4.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.917,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 763888.61,
"financial_exposure_usd": 980815.74,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101456",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "medium",
"timestamp": "2026-01-02T00:16:00Z",
"trace_id": "19fd39d7-a85b-cca0-e7fb-efb5b094d987"
} | {
"account_age_days": 896,
"account_id": "ACCT-3FE85002814E",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 871,
"timestamp": "2026-01-02T00:16:00Z",
"transaction_amount_usd": 56162.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.9,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 474856.56,
"financial_exposure_usd": 569453.18,
"recoverable_pct": 0.143
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100078",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "medium",
"timestamp": "2026-01-01T01:18:00Z",
"trace_id": "0a2d36a6-0580-4493-b664-6199ed25459e"
} | {
"account_age_days": 1492,
"account_id": "ACCT-D6EAF269514E",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_1",
"session_entropy": 0.848
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 790,
"timestamp": "2026-01-01T01:18:00Z",
"transaction_amount_usd": 36938.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.878,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1152565.02,
"financial_exposure_usd": 1180039.03,
"recoverable_pct": 0.258
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101772",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "medium",
"timestamp": "2026-01-02T05:32:00Z",
"trace_id": "9a8c75fc-ec6a-ffe3-bee0-acb8925c4111"
} | {
"account_age_days": 684,
"account_id": "ACCT-FE97C55A8E08",
"baseline_risk_score": 0.314,
"kyc_tier": "tier_1",
"session_entropy": 0.16
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 381,
"timestamp": "2026-01-02T05:32:00Z",
"transaction_amount_usd": 114970.86
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.597,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 127565.52,
"financial_exposure_usd": 197714.99,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100173",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "low",
"timestamp": "2026-01-01T02:53:00Z",
"trace_id": "b7c315a2-dc16-cbae-6541-35f889238eb6"
} | {
"account_age_days": 503,
"account_id": "ACCT-B3EFE892E85C",
"baseline_risk_score": 0.637,
"kyc_tier": "tier_2",
"session_entropy": 0.553
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 86,
"timestamp": "2025-12-31T22:12:00Z",
"transaction_amount_usd": 5.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.946,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 547007.66,
"financial_exposure_usd": 563417.52,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.