schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108848",
"label": "benign",
"label_confidence": 0.481,
"severity": "high",
"timestamp": "2026-01-07T03:28:00Z",
"trace_id": "884c4ad2-9897-65ac-82e9-d6160aa7b69d"
} | {
"account_age_days": 759,
"account_id": "ACCT-A7B4C1B14BAF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.618
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 326,
"timestamp": "2026-01-06T23:02:00Z",
"transaction_amount_usd": 8.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.736,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2820.43,
"financial_exposure_usd": 2960.21,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105022",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "critical",
"timestamp": "2026-01-04T11:42:00Z",
"trace_id": "c506fbe5-679f-b968-e696-57d62a4c83ab"
} | {
"account_age_days": 233,
"account_id": "ACCT-746892029233",
"baseline_risk_score": 0.246,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 991,
"timestamp": "2026-01-04T11:42:00Z",
"transaction_amount_usd": 2143884.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.563,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1041686.68,
"financial_exposure_usd": 1818016.69,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108256",
"label": "benign",
"label_confidence": 0.549,
"severity": "medium",
"timestamp": "2026-01-06T17:36:00Z",
"trace_id": "04ff7726-7dde-1835-e262-2616e925b050"
} | {
"account_age_days": 1366,
"account_id": "ACCT-D2D87758B5EF",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_2",
"session_entropy": 0.233
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 396,
"timestamp": "2026-01-06T05:23:00Z",
"transaction_amount_usd": 0.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1820.73,
"financial_exposure_usd": 2202.91,
"recoverable_pct": 0.944
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105851",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-05T01:31:00Z",
"trace_id": "07ae91aa-49cb-4004-d52e-35db7dabb7fa"
} | {
"account_age_days": 1049,
"account_id": "ACCT-D5D28F92C7E1",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_3",
"session_entropy": 0.942
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 676,
"timestamp": "2026-01-05T01:31:00Z",
"transaction_amount_usd": 1150439.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.779,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1357660.58,
"financial_exposure_usd": 1458784.14,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105661",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "high",
"timestamp": "2026-01-04T22:21:00Z",
"trace_id": "88c9d2c4-de08-4426-c254-54e9efad326c"
} | {
"account_age_days": 1196,
"account_id": "ACCT-2A88B60EC490",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_3",
"session_entropy": 0.263
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 109,
"timestamp": "2026-01-04T22:21:00Z",
"transaction_amount_usd": 1999914.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.476,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2478213.93,
"financial_exposure_usd": 5119067.73,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108573",
"label": "benign",
"label_confidence": 0.69,
"severity": "medium",
"timestamp": "2026-01-06T22:53:00Z",
"trace_id": "b0f22847-a495-795b-dc66-65cbfa3d0243"
} | {
"account_age_days": 392,
"account_id": "ACCT-82A39DA90369",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.13
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 637,
"timestamp": "2026-01-06T22:53:00Z",
"transaction_amount_usd": 13276.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.689,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 103.57,
"financial_exposure_usd": 124.25,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104287",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "medium",
"timestamp": "2026-01-03T23:27:00Z",
"trace_id": "09c21a3b-9589-c535-5098-b8804712ef72"
} | {
"account_age_days": 1980,
"account_id": "ACCT-BFF6361A2F3B",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_3",
"session_entropy": 0.68
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 897,
"timestamp": "2026-01-03T23:27:00Z",
"transaction_amount_usd": 1367604.75
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.672,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2263987.86,
"financial_exposure_usd": 5506074.01,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105702",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "low",
"timestamp": "2026-01-04T23:02:00Z",
"trace_id": "219a23fd-ed3c-2e1c-c26d-30bfbe428a6c"
} | {
"account_age_days": 1598,
"account_id": "ACCT-DE1B599BF8FE",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_2",
"session_entropy": 0.259
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 951,
"timestamp": "2026-01-04T23:02:00Z",
"transaction_amount_usd": 1321804.03
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3238800.21,
"financial_exposure_usd": 3582719.91,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100889",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "low",
"timestamp": "2026-01-01T14:49:00Z",
"trace_id": "63f64077-2b2e-4894-49e5-77f27b253660"
} | {
"account_age_days": 1513,
"account_id": "ACCT-AD0D9D42EDAD",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.758
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 247,
"timestamp": "2026-01-01T14:49:00Z",
"transaction_amount_usd": 17452.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.845,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 414674.47,
"financial_exposure_usd": 546154.09,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101683",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "low",
"timestamp": "2026-01-02T04:03:00Z",
"trace_id": "6a7cb24e-6577-3eb6-d014-068fd1ee68b3"
} | {
"account_age_days": 437,
"account_id": "ACCT-7BBCBDC42998",
"baseline_risk_score": 0.508,
"kyc_tier": "tier_1",
"session_entropy": 0.765
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 317,
"timestamp": "2026-01-01T18:14:00Z",
"transaction_amount_usd": 22.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.774,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 999123.42,
"financial_exposure_usd": 1085494.62,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107189",
"label": "benign",
"label_confidence": 0.609,
"severity": "high",
"timestamp": "2026-01-05T23:49:00Z",
"trace_id": "fdb02c61-2e59-3529-f737-cefba1bc5843"
} | {
"account_age_days": 1740,
"account_id": "ACCT-80D2A969467F",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_1",
"session_entropy": 0.194
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 125,
"timestamp": "2026-01-05T23:49:00Z",
"transaction_amount_usd": 10171.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 4083.76,
"financial_exposure_usd": 4217.46,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108053",
"label": "benign",
"label_confidence": 0.735,
"severity": "high",
"timestamp": "2026-01-06T14:13:00Z",
"trace_id": "1a0ad44d-bf95-a7d3-a828-3e4c17c53d15"
} | {
"account_age_days": 1172,
"account_id": "ACCT-551224C73B15",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.767
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 587,
"timestamp": "2026-01-06T14:13:00Z",
"transaction_amount_usd": 14084.97
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2665.79,
"financial_exposure_usd": 3645.78,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103356",
"label": "fraudulent",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-03T07:56:00Z",
"trace_id": "33b93a5e-5999-45cd-cab5-a5b5c62f1cd7"
} | {
"account_age_days": 1955,
"account_id": "ACCT-138CFCE50F96",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_2",
"session_entropy": 0.266
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 534,
"timestamp": "2026-01-03T07:56:00Z",
"transaction_amount_usd": 1849045.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3203219.08,
"financial_exposure_usd": 5814051.35,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109362",
"label": "benign",
"label_confidence": 0.598,
"severity": "high",
"timestamp": "2026-01-07T12:02:00Z",
"trace_id": "a5e6bfa8-8711-b1fd-b495-956479f176bd"
} | {
"account_age_days": 27,
"account_id": "ACCT-372795FBADD8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 332,
"timestamp": "2026-01-07T09:16:00Z",
"transaction_amount_usd": 19.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 4338.66,
"financial_exposure_usd": 6226.11,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107437",
"label": "benign",
"label_confidence": 0.568,
"severity": "low",
"timestamp": "2026-01-06T03:57:00Z",
"trace_id": "4a31fb99-22cf-3b1e-451c-d48b9664c277"
} | {
"account_age_days": 1788,
"account_id": "ACCT-78DC2C568E94",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.499
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1053,
"timestamp": "2026-01-06T03:57:00Z",
"transaction_amount_usd": 10142.62
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.8,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pri... | {
"customer_funds_at_risk_usd": 665.73,
"financial_exposure_usd": 1182.65,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102911",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "low",
"timestamp": "2026-01-03T00:31:00Z",
"trace_id": "554c2f4d-4454-5dd2-3fcd-30a8810c8156"
} | {
"account_age_days": 1318,
"account_id": "ACCT-8DB3F112AE3B",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.778
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 899,
"timestamp": "2026-01-03T00:31:00Z",
"transaction_amount_usd": 111698.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 83581.64,
"financial_exposure_usd": 144386.29,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101729",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "medium",
"timestamp": "2026-01-02T04:49:00Z",
"trace_id": "762fd846-2bb0-d957-b639-20f2d8ce5c88"
} | {
"account_age_days": 733,
"account_id": "ACCT-A68CE07CDE51",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_1",
"session_entropy": 0.16
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 261,
"timestamp": "2026-01-02T04:49:00Z",
"transaction_amount_usd": 65448.19
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.94,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 328083.26,
"financial_exposure_usd": 682778.31,
"recoverable_pct": 0.284
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106896",
"label": "benign",
"label_confidence": 0.459,
"severity": "medium",
"timestamp": "2026-01-05T18:56:00Z",
"trace_id": "a900fae8-d7f9-da88-7e31-d89f2a01a6eb"
} | {
"account_age_days": 1576,
"account_id": "ACCT-BBF0173B360E",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_2",
"session_entropy": 0.452
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 492,
"timestamp": "2026-01-05T18:56:00Z",
"transaction_amount_usd": 11177.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3938.99,
"financial_exposure_usd": 4776.04,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108173",
"label": "benign",
"label_confidence": 0.699,
"severity": "low",
"timestamp": "2026-01-06T16:13:00Z",
"trace_id": "af9d8e5e-bedd-11d2-8efc-dff74e122b1a"
} | {
"account_age_days": 292,
"account_id": "ACCT-042A877A06C6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.271
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 586,
"timestamp": "2026-01-06T16:13:00Z",
"transaction_amount_usd": 9089.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2045.68,
"financial_exposure_usd": 2314.82,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105072",
"label": "fraudulent",
"label_confidence": 0.601,
"severity": "high",
"timestamp": "2026-01-04T12:32:00Z",
"trace_id": "e18a3334-a6ec-d64c-a44f-699f29d3f18d"
} | {
"account_age_days": 49,
"account_id": "ACCT-6BD68E728F98",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_3",
"session_entropy": 0.707
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 221,
"timestamp": "2026-01-04T11:13:00Z",
"transaction_amount_usd": 4.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4938902.55,
"financial_exposure_usd": 6229048.34,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105925",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-05T02:45:00Z",
"trace_id": "b3faee30-8441-ac2f-d920-a990b346eb5f"
} | {
"account_age_days": 986,
"account_id": "ACCT-7C6DF32B6277",
"baseline_risk_score": 0.248,
"kyc_tier": "tier_1",
"session_entropy": 0.115
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1099,
"timestamp": "2026-01-05T02:45:00Z",
"transaction_amount_usd": 560217.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.875,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5095456.43,
"financial_exposure_usd": 5647365.59,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109112",
"label": "benign",
"label_confidence": 0.512,
"severity": "low",
"timestamp": "2026-01-07T07:52:00Z",
"trace_id": "04290343-7918-51a3-5814-ea601611cf11"
} | {
"account_age_days": 549,
"account_id": "ACCT-7B746BA16A7B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.379
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 573,
"timestamp": "2026-01-07T07:52:00Z",
"transaction_amount_usd": 6833.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.609,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1299.34,
"financial_exposure_usd": 2129.08,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101621",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "medium",
"timestamp": "2026-01-02T03:01:00Z",
"trace_id": "b4160d9d-b045-b255-56af-0c4694974d98"
} | {
"account_age_days": 660,
"account_id": "ACCT-495FBEAE78F0",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_3",
"session_entropy": 0.382
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 875,
"timestamp": "2026-01-02T03:01:00Z",
"transaction_amount_usd": 66687.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.945,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 768609.48,
"financial_exposure_usd": 903465.93,
"recoverable_pct": 0.211
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104120",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "low",
"timestamp": "2026-01-03T20:40:00Z",
"trace_id": "f7ca4166-5880-e890-70a1-5003e525f8fa"
} | {
"account_age_days": 1441,
"account_id": "ACCT-ED7E1A81AA05",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_2",
"session_entropy": 0.348
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 516,
"timestamp": "2026-01-03T20:40:00Z",
"transaction_amount_usd": 1559590.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.366,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3201448.13,
"financial_exposure_usd": 3989565.27,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107540",
"label": "benign",
"label_confidence": 0.567,
"severity": "low",
"timestamp": "2026-01-06T05:40:00Z",
"trace_id": "22edd374-979b-426d-7707-b16256f6b01c"
} | {
"account_age_days": 231,
"account_id": "ACCT-12F737569C8B",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_3",
"session_entropy": 0.767
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 292,
"timestamp": "2026-01-06T01:55:00Z",
"transaction_amount_usd": 20.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1158.54,
"financial_exposure_usd": 2416.35,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102515",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-02T17:55:00Z",
"trace_id": "29c7ca18-86cc-2af4-17e3-0a9a78ee93dd"
} | {
"account_age_days": 1041,
"account_id": "ACCT-2DD9ED67928F",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_1",
"session_entropy": 0.309
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 598,
"timestamp": "2026-01-02T17:55:00Z",
"transaction_amount_usd": 22687.22
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.594,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 753767.09,
"financial_exposure_usd": 988457.49,
"recoverable_pct": 0.269
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103519",
"label": "fraudulent",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-03T10:39:00Z",
"trace_id": "d3d2d422-ba7a-f478-a8ea-8408e58e4a18"
} | {
"account_age_days": 1462,
"account_id": "ACCT-E8D0BB5A7783",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 389,
"timestamp": "2026-01-03T03:51:00Z",
"transaction_amount_usd": 6.98
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.683,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4538493.94,
"financial_exposure_usd": 5081473.89,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107653",
"label": "benign",
"label_confidence": 0.461,
"severity": "low",
"timestamp": "2026-01-06T07:33:00Z",
"trace_id": "c83bdb2a-d0e1-e4fd-6ee9-e64d876b745f"
} | {
"account_age_days": 1582,
"account_id": "ACCT-C4E6FA41F41B",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_2",
"session_entropy": 0.551
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 425,
"timestamp": "2026-01-06T07:33:00Z",
"transaction_amount_usd": 7815.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.701,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1828.99,
"financial_exposure_usd": 2379.04,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101193",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "critical",
"timestamp": "2026-01-01T19:53:00Z",
"trace_id": "c04b6041-dc80-1ad2-c356-8aa2dc5f3136"
} | {
"account_age_days": 154,
"account_id": "ACCT-FA8600CD1094",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_1",
"session_entropy": 0.719
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 943,
"timestamp": "2026-01-01T19:53:00Z",
"transaction_amount_usd": 117172.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.858,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 442058.66,
"financial_exposure_usd": 760078.05,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102530",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "high",
"timestamp": "2026-01-02T18:10:00Z",
"trace_id": "2b380047-5d5d-6475-8112-9414bd2c6c1e"
} | {
"account_age_days": 456,
"account_id": "ACCT-8B1814C92547",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.74
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 281,
"timestamp": "2026-01-02T13:37:00Z",
"transaction_amount_usd": 0.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1255202.59,
"financial_exposure_usd": 1257451.72,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105853",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "high",
"timestamp": "2026-01-05T01:33:00Z",
"trace_id": "b5dcb76d-b469-ac48-91f6-2bbe8e10f34d"
} | {
"account_age_days": 332,
"account_id": "ACCT-6333950A8FE4",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_1",
"session_entropy": 0.132
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 648,
"timestamp": "2026-01-05T01:33:00Z",
"transaction_amount_usd": 2897815.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.498,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 755378.43,
"financial_exposure_usd": 1797700.57,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101905",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-02T07:45:00Z",
"trace_id": "0e07c673-b84a-a0d2-ae74-c395ca02c20f"
} | {
"account_age_days": 1603,
"account_id": "ACCT-29F4892E9758",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_1",
"session_entropy": 0.558
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 374,
"timestamp": "2026-01-02T00:21:00Z",
"transaction_amount_usd": 18.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.375,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 280192.23,
"financial_exposure_usd": 584636.18,
"recoverable_pct": 0.21
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102713",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-02T21:13:00Z",
"trace_id": "b4171429-ac30-333e-42da-0de847360a1d"
} | {
"account_age_days": 587,
"account_id": "ACCT-4E992BB5C1DD",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_3",
"session_entropy": 0.598
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1056,
"timestamp": "2026-01-02T21:13:00Z",
"transaction_amount_usd": 40941.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 374418.12,
"financial_exposure_usd": 653410.5,
"recoverable_pct": 0.123
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101045",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-01T17:25:00Z",
"trace_id": "bd4d75c0-bbd4-437b-4b11-c3bcd4cf4e60"
} | {
"account_age_days": 212,
"account_id": "ACCT-17D2CF2661D2",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_1",
"session_entropy": 0.376
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 134,
"timestamp": "2026-01-01T10:37:00Z",
"transaction_amount_usd": 3.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 471762.58,
"financial_exposure_usd": 607496.98,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108916",
"label": "benign",
"label_confidence": 0.531,
"severity": "low",
"timestamp": "2026-01-07T04:36:00Z",
"trace_id": "a929e654-1a27-7469-b410-1351822ddaf7"
} | {
"account_age_days": 246,
"account_id": "ACCT-B78093D763C2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.246
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 918,
"timestamp": "2026-01-07T04:36:00Z",
"transaction_amount_usd": 3865.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 9712.76,
"financial_exposure_usd": 9757.16,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104870",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "high",
"timestamp": "2026-01-04T09:10:00Z",
"trace_id": "83a9da01-b3c8-4576-c7ea-ca03c66e1101"
} | {
"account_age_days": 44,
"account_id": "ACCT-16CDF9E46CE1",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.454
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 364,
"timestamp": "2026-01-04T03:40:00Z",
"transaction_amount_usd": 20.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.385,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3308652.72,
"financial_exposure_usd": 6627506.71,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101467",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-02T00:27:00Z",
"trace_id": "b64febd6-f053-0661-fd9d-8a6f6924c3d2"
} | {
"account_age_days": 1641,
"account_id": "ACCT-3133E368504D",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.312
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 154,
"timestamp": "2026-01-01T21:26:00Z",
"transaction_amount_usd": 20.3
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 428338.89,
"financial_exposure_usd": 656385.61,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104771",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-04T07:31:00Z",
"trace_id": "5d142e4f-b901-4fcd-ec25-63173f5b270c"
} | {
"account_age_days": 787,
"account_id": "ACCT-ABB1C9F65AF6",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.671
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 939,
"timestamp": "2026-01-04T07:31:00Z",
"transaction_amount_usd": 508291.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.435,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4588744.81,
"financial_exposure_usd": 6512231.67,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105688",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "medium",
"timestamp": "2026-01-04T22:48:00Z",
"trace_id": "ac2177fc-50ae-85b8-e4f3-b1e758bcfec4"
} | {
"account_age_days": 1225,
"account_id": "ACCT-E94049AED587",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.553
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 389,
"timestamp": "2026-01-04T12:05:00Z",
"transaction_amount_usd": 14.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3142968.38,
"financial_exposure_usd": 5281743.44,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106110",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-05T05:50:00Z",
"trace_id": "edabf4ca-d601-319f-7edf-6393c45d9b41"
} | {
"account_age_days": 137,
"account_id": "ACCT-69BC13EC9B79",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.672
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 192,
"timestamp": "2026-01-05T00:23:00Z",
"transaction_amount_usd": 16.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.423,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5382660.81,
"financial_exposure_usd": 5846815.15,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100303",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-01T05:03:00Z",
"trace_id": "181d8b09-d455-b87e-9322-90235a995017"
} | {
"account_age_days": 1504,
"account_id": "ACCT-57E69DF9A142",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_3",
"session_entropy": 0.275
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 412,
"timestamp": "2026-01-01T05:03:00Z",
"transaction_amount_usd": 24894.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 765169.48,
"financial_exposure_usd": 766438.01,
"recoverable_pct": 0.249
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100055",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "critical",
"timestamp": "2026-01-01T00:55:00Z",
"trace_id": "85319f0f-ba53-3122-74b7-96204a73b0bf"
} | {
"account_age_days": 409,
"account_id": "ACCT-C8E609391D2F",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_3",
"session_entropy": 0.19
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1083,
"timestamp": "2026-01-01T00:55:00Z",
"transaction_amount_usd": 52322.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 366070.95,
"financial_exposure_usd": 595476.38,
"recoverable_pct": 0.348
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103464",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "medium",
"timestamp": "2026-01-03T09:44:00Z",
"trace_id": "011d7285-b324-c5cd-f151-5fcfd5978828"
} | {
"account_age_days": 579,
"account_id": "ACCT-5E9619EAAB9B",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.625
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 817,
"timestamp": "2026-01-03T09:44:00Z",
"transaction_amount_usd": 1250302.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.415,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 621506.82,
"financial_exposure_usd": 1072975.21,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101418",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-01T23:38:00Z",
"trace_id": "9a1ba8b8-2074-37b6-e534-9e9a6c9f704d"
} | {
"account_age_days": 819,
"account_id": "ACCT-DEAB7CBD28FF",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_1",
"session_entropy": 0.3
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 97,
"timestamp": "2026-01-01T18:54:00Z",
"transaction_amount_usd": 23.91
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.524,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 75846.59,
"financial_exposure_usd": 96324.69,
"recoverable_pct": 0.149
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108054",
"label": "benign",
"label_confidence": 0.58,
"severity": "medium",
"timestamp": "2026-01-06T14:14:00Z",
"trace_id": "57e7e125-90eb-834c-a505-6b22a19fad80"
} | {
"account_age_days": 955,
"account_id": "ACCT-D07FCF1A273C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.499
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 457,
"timestamp": "2026-01-06T14:14:00Z",
"transaction_amount_usd": 7831.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 3760.52,
"financial_exposure_usd": 4731.47,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108544",
"label": "benign",
"label_confidence": 0.533,
"severity": "medium",
"timestamp": "2026-01-06T22:24:00Z",
"trace_id": "973679cd-1e5e-196b-1a3b-a5c5f910794f"
} | {
"account_age_days": 627,
"account_id": "ACCT-0AEC307B86C9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 92,
"timestamp": "2026-01-06T22:24:00Z",
"transaction_amount_usd": 14678.97
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 22.24,
"financial_exposure_usd": 39.36,
"recoverable_pct": 0.986
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106005",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "medium",
"timestamp": "2026-01-05T04:05:00Z",
"trace_id": "986e2788-2f44-3a19-19e8-5e1b9fb311c6"
} | {
"account_age_days": 530,
"account_id": "ACCT-3A76D413FD13",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1071,
"timestamp": "2026-01-05T04:05:00Z",
"transaction_amount_usd": 2265238.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7190816.32,
"financial_exposure_usd": 7277698.78,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102385",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "critical",
"timestamp": "2026-01-02T15:45:00Z",
"trace_id": "4a8d542b-c009-f032-a442-2a48f08d0c26"
} | {
"account_age_days": 244,
"account_id": "ACCT-5636EBCF9D0C",
"baseline_risk_score": 0.571,
"kyc_tier": "tier_1",
"session_entropy": 0.572
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 743,
"timestamp": "2026-01-02T15:45:00Z",
"transaction_amount_usd": 31979.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.619,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 43889.94,
"financial_exposure_usd": 101548.9,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108598",
"label": "benign",
"label_confidence": 0.618,
"severity": "low",
"timestamp": "2026-01-06T23:18:00Z",
"trace_id": "3f143e64-1fd7-1531-674b-f61368977b65"
} | {
"account_age_days": 61,
"account_id": "ACCT-71456122F64D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.546
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 244,
"timestamp": "2026-01-06T23:18:00Z",
"transaction_amount_usd": 8713.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1442.99,
"financial_exposure_usd": 2064.99,
"recoverable_pct": 0.655
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108686",
"label": "benign",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-07T00:46:00Z",
"trace_id": "d0cfc578-404b-0d72-6881-edfdc4fbada1"
} | {
"account_age_days": 1386,
"account_id": "ACCT-29BBFAA8B45C",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.757
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 267,
"timestamp": "2026-01-06T20:43:00Z",
"transaction_amount_usd": 2.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1846.15,
"financial_exposure_usd": 4045.91,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106414",
"label": "fraudulent",
"label_confidence": 0.756,
"severity": "medium",
"timestamp": "2026-01-05T10:54:00Z",
"trace_id": "f96b1642-69d7-4966-deb4-097a0d08b992"
} | {
"account_age_days": 252,
"account_id": "ACCT-D21C59258A67",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_3",
"session_entropy": 0.786
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 313,
"timestamp": "2026-01-05T05:25:00Z",
"transaction_amount_usd": 5.95
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.647,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2358767.22,
"financial_exposure_usd": 2361368.03,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100896",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "critical",
"timestamp": "2026-01-01T14:56:00Z",
"trace_id": "c27b99f9-0cb8-ea81-ceaa-de532032019e"
} | {
"account_age_days": 1659,
"account_id": "ACCT-D6D76A365779",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_3",
"session_entropy": 0.338
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 983,
"timestamp": "2026-01-01T14:56:00Z",
"transaction_amount_usd": 100843.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.701,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 841434.33,
"financial_exposure_usd": 1014869.27,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103861",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "high",
"timestamp": "2026-01-03T16:21:00Z",
"trace_id": "9fbda1a3-ff85-de79-d2fe-930a7e9d15b3"
} | {
"account_age_days": 501,
"account_id": "ACCT-E9CECE66D8B9",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_2",
"session_entropy": 0.56
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 812,
"timestamp": "2026-01-03T16:21:00Z",
"transaction_amount_usd": 2460359.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3687680.43,
"financial_exposure_usd": 6705357.33,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109423",
"label": "benign",
"label_confidence": 0.497,
"severity": "medium",
"timestamp": "2026-01-07T13:03:00Z",
"trace_id": "cad196fc-24f8-488e-b7ca-e2cf35b97284"
} | {
"account_age_days": 1104,
"account_id": "ACCT-BB0FBA0FF315",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_3",
"session_entropy": 0.559
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 972,
"timestamp": "2026-01-07T13:03:00Z",
"transaction_amount_usd": 10292.35
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.792,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1789.48,
"financial_exposure_usd": 2337.21,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109452",
"label": "benign",
"label_confidence": 0.451,
"severity": "high",
"timestamp": "2026-01-07T13:32:00Z",
"trace_id": "5e6d467f-86da-f9cb-1875-b3d21a205fd4"
} | {
"account_age_days": 169,
"account_id": "ACCT-9A5876BB7B7B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.826
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 122,
"timestamp": "2026-01-07T13:32:00Z",
"transaction_amount_usd": 2319.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 733.51,
"financial_exposure_usd": 1292.77,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103664",
"label": "fraudulent",
"label_confidence": 0.685,
"severity": "medium",
"timestamp": "2026-01-03T13:04:00Z",
"trace_id": "599d2c42-ba14-c4f8-abce-cd01beada8fa"
} | {
"account_age_days": 718,
"account_id": "ACCT-D16482DD0D0A",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_1",
"session_entropy": 0.906
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 852,
"timestamp": "2026-01-03T13:04:00Z",
"transaction_amount_usd": 874369.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.906,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2230837.85,
"financial_exposure_usd": 4709546.79,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105242",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-04T15:22:00Z",
"trace_id": "a46ebb45-15a1-5d05-daa7-14a54b75eb8b"
} | {
"account_age_days": 1707,
"account_id": "ACCT-84216C1F6167",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_3",
"session_entropy": 0.61
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 729,
"timestamp": "2026-01-04T15:22:00Z",
"transaction_amount_usd": 574946.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.719,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2827108.79,
"financial_exposure_usd": 5331184.14,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101666",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-02T03:46:00Z",
"trace_id": "1bded8c0-5685-768f-a6c7-5cc80b132aab"
} | {
"account_age_days": 1044,
"account_id": "ACCT-C1D4C414D8FB",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_2",
"session_entropy": 0.765
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 256,
"timestamp": "2026-01-02T03:46:00Z",
"transaction_amount_usd": 27904.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1475852.92,
"financial_exposure_usd": 1621009.67,
"recoverable_pct": 0.712
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108183",
"label": "benign",
"label_confidence": 0.598,
"severity": "medium",
"timestamp": "2026-01-06T16:23:00Z",
"trace_id": "3f1c96e3-4344-bc0d-5b83-bfa120be2dc4"
} | {
"account_age_days": 1858,
"account_id": "ACCT-723616E18EB8",
"baseline_risk_score": 0.094,
"kyc_tier": "tier_3",
"session_entropy": 0.946
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1034,
"timestamp": "2026-01-06T16:23:00Z",
"transaction_amount_usd": 5024.06
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.592,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1594.29,
"financial_exposure_usd": 2140.17,
"recoverable_pct": 0.678
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108827",
"label": "benign",
"label_confidence": 0.587,
"severity": "low",
"timestamp": "2026-01-07T03:07:00Z",
"trace_id": "ba7f0032-c9a0-8d47-18e1-d5060433e150"
} | {
"account_age_days": 708,
"account_id": "ACCT-69162548DB5A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.64
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 913,
"timestamp": "2026-01-07T03:07:00Z",
"transaction_amount_usd": 4887.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.556,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3349.35,
"financial_exposure_usd": 5760.49,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106236",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "high",
"timestamp": "2026-01-05T07:56:00Z",
"trace_id": "5bbaa2b8-9c67-3106-cf04-0c56660939ce"
} | {
"account_age_days": 1352,
"account_id": "ACCT-238744454C0F",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.137
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 325,
"timestamp": "2026-01-05T05:45:00Z",
"transaction_amount_usd": 14.65
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.457,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 694070.85,
"financial_exposure_usd": 752323.27,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107944",
"label": "benign",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-06T12:24:00Z",
"trace_id": "cf141833-1f45-39e2-0237-9222f25941de"
} | {
"account_age_days": 1311,
"account_id": "ACCT-3AB6186787F0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.168
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1089,
"timestamp": "2026-01-06T12:24:00Z",
"transaction_amount_usd": 12199.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.59,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1741.75,
"financial_exposure_usd": 2646.09,
"recoverable_pct": 0.995
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107019",
"label": "benign",
"label_confidence": 0.614,
"severity": "high",
"timestamp": "2026-01-05T20:59:00Z",
"trace_id": "51f921a3-2e0e-a282-0ee7-81f8680dce02"
} | {
"account_age_days": 1601,
"account_id": "ACCT-5F6E78109690",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.68
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 300,
"timestamp": "2026-01-05T20:59:00Z",
"transaction_amount_usd": 11386.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 730.75,
"financial_exposure_usd": 1767,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109975",
"label": "benign",
"label_confidence": 0.477,
"severity": "medium",
"timestamp": "2026-01-07T22:15:00Z",
"trace_id": "76a2481e-948c-d886-3f73-22ef300d22c7"
} | {
"account_age_days": 1644,
"account_id": "ACCT-7373024DDCDE",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_2",
"session_entropy": 0.588
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 680,
"timestamp": "2026-01-07T22:15:00Z",
"transaction_amount_usd": 5175.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.55,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 472.57,
"financial_exposure_usd": 479.56,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107597",
"label": "benign",
"label_confidence": 0.726,
"severity": "critical",
"timestamp": "2026-01-06T06:37:00Z",
"trace_id": "e22ebebf-9c8f-9842-7c7a-657e1098bf1b"
} | {
"account_age_days": 1755,
"account_id": "ACCT-CF17AAA2CB9A",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_3",
"session_entropy": 0.817
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 563,
"timestamp": "2026-01-06T06:37:00Z",
"transaction_amount_usd": 5419.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 2",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3585.97,
"financial_exposure_usd": 5384.9,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107362",
"label": "benign",
"label_confidence": 0.485,
"severity": "low",
"timestamp": "2026-01-06T02:42:00Z",
"trace_id": "e14bf994-3b2e-233b-0246-ff60d9e8ed75"
} | {
"account_age_days": 1924,
"account_id": "ACCT-FF49ED9A6F22",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_2",
"session_entropy": 0.387
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 183,
"timestamp": "2026-01-06T02:42:00Z",
"transaction_amount_usd": 2479.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4454.92,
"financial_exposure_usd": 4889.79,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107808",
"label": "benign",
"label_confidence": 0.49,
"severity": "high",
"timestamp": "2026-01-06T10:08:00Z",
"trace_id": "1a1e90ed-d804-4704-4361-1f4388ab791d"
} | {
"account_age_days": 830,
"account_id": "ACCT-C8660C8BB72C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.531
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 398,
"timestamp": "2026-01-06T07:39:00Z",
"transaction_amount_usd": 6.48
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.765,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3888.08,
"financial_exposure_usd": 4441.33,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106438",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "high",
"timestamp": "2026-01-05T11:18:00Z",
"trace_id": "cf3a3731-254f-b613-af4f-7ca9395d7cbc"
} | {
"account_age_days": 1847,
"account_id": "ACCT-9EE9EB02B35D",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_2",
"session_entropy": 0.208
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 743,
"timestamp": "2026-01-05T11:18:00Z",
"transaction_amount_usd": 1897922.35
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3995684.07,
"financial_exposure_usd": 5303814.9,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108085",
"label": "benign",
"label_confidence": 0.708,
"severity": "high",
"timestamp": "2026-01-06T14:45:00Z",
"trace_id": "73bf557e-ed39-1137-b550-efe687d631ab"
} | {
"account_age_days": 1093,
"account_id": "ACCT-663F731B45E6",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_3",
"session_entropy": 0.478
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 304,
"timestamp": "2026-01-06T11:41:00Z",
"transaction_amount_usd": 8.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1025.52,
"financial_exposure_usd": 1326.06,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102915",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "medium",
"timestamp": "2026-01-03T00:35:00Z",
"trace_id": "cebf3f51-13a3-c47b-777d-e86469798584"
} | {
"account_age_days": 782,
"account_id": "ACCT-A8D4E61FAA8B",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_1",
"session_entropy": 0.437
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 550,
"timestamp": "2026-01-03T00:35:00Z",
"transaction_amount_usd": 119597.56
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.487,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 661230.87,
"financial_exposure_usd": 769227.25,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109325",
"label": "benign",
"label_confidence": 0.55,
"severity": "medium",
"timestamp": "2026-01-07T11:25:00Z",
"trace_id": "c5af1511-3840-3353-1903-f24001096bf8"
} | {
"account_age_days": 1515,
"account_id": "ACCT-5702D2B05C1D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 700,
"timestamp": "2026-01-07T11:25:00Z",
"transaction_amount_usd": 14608.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2759.98,
"financial_exposure_usd": 3799.79,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101620",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "low",
"timestamp": "2026-01-02T03:00:00Z",
"trace_id": "13e1b862-2951-781a-f008-f487e3f44794"
} | {
"account_age_days": 1428,
"account_id": "ACCT-0CAD49C18BEC",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_2",
"session_entropy": 0.198
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1060,
"timestamp": "2026-01-02T03:00:00Z",
"transaction_amount_usd": 47533.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.443,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 576127.48,
"financial_exposure_usd": 717111.95,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108896",
"label": "benign",
"label_confidence": 0.563,
"severity": "low",
"timestamp": "2026-01-07T04:16:00Z",
"trace_id": "cfd09c2b-5ce7-9bb5-8399-d4a607ded7bb"
} | {
"account_age_days": 1929,
"account_id": "ACCT-0EDDACD8E2D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.271
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 354,
"timestamp": "2026-01-07T02:52:00Z",
"transaction_amount_usd": 13.71
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1196.61,
"financial_exposure_usd": 2203.32,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102150",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-02T11:50:00Z",
"trace_id": "3e98a76d-597d-36aa-da12-0cb435b413b2"
} | {
"account_age_days": 1999,
"account_id": "ACCT-CF60BF33B74A",
"baseline_risk_score": 0.52,
"kyc_tier": "tier_1",
"session_entropy": 0.948
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1172,
"timestamp": "2026-01-02T11:50:00Z",
"transaction_amount_usd": 3750.38
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.395,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 581074.4,
"financial_exposure_usd": 603447.08,
"recoverable_pct": 0.398
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105105",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "high",
"timestamp": "2026-01-04T13:05:00Z",
"trace_id": "bee58158-d345-69c1-da87-54de41149fc2"
} | {
"account_age_days": 1659,
"account_id": "ACCT-0811A262AADC",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.382
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 228,
"timestamp": "2026-01-04T13:05:00Z",
"transaction_amount_usd": 396756.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.369,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2529173.12,
"financial_exposure_usd": 2874769.27,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105476",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-04T19:16:00Z",
"trace_id": "ebc15e61-1841-891f-fcf8-4a95f788edc0"
} | {
"account_age_days": 126,
"account_id": "ACCT-2EDE3C3D2161",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_2",
"session_entropy": 0.372
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 166,
"timestamp": "2026-01-04T13:53:00Z",
"transaction_amount_usd": 11.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.735,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2517941.51,
"financial_exposure_usd": 4576218.75,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103561",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "low",
"timestamp": "2026-01-03T11:21:00Z",
"trace_id": "1c8116b3-7d35-e9ac-a9ca-274340767f08"
} | {
"account_age_days": 715,
"account_id": "ACCT-D78B8D8AAD03",
"baseline_risk_score": 0.229,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 558,
"timestamp": "2026-01-03T11:21:00Z",
"transaction_amount_usd": 1658588.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3663881.59,
"financial_exposure_usd": 4351368.32,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103579",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "low",
"timestamp": "2026-01-03T11:39:00Z",
"trace_id": "7458f3e2-6946-6dd5-2611-7ccd356a5227"
} | {
"account_age_days": 1016,
"account_id": "ACCT-2BA58E98B830",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_3",
"session_entropy": 0.162
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 250,
"timestamp": "2026-01-03T01:54:00Z",
"transaction_amount_usd": 2.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3841865.07,
"financial_exposure_usd": 8937685.19,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103835",
"label": "fraudulent",
"label_confidence": 0.663,
"severity": "high",
"timestamp": "2026-01-03T15:55:00Z",
"trace_id": "449a2ecc-5f25-c2d3-a97d-3a56a499050b"
} | {
"account_age_days": 95,
"account_id": "ACCT-B83F927FFE28",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 403,
"timestamp": "2026-01-03T15:55:00Z",
"transaction_amount_usd": 2593631.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3661904.5,
"financial_exposure_usd": 3741142.23,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109403",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-07T12:43:00Z",
"trace_id": "d6b8d432-b217-c594-daa7-9f1f0a8e5332"
} | {
"account_age_days": 1629,
"account_id": "ACCT-3B2E4DCB7404",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.501
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 184,
"timestamp": "2026-01-07T12:43:00Z",
"transaction_amount_usd": 12843.2
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.735,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5387.59,
"financial_exposure_usd": 6783.78,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104236",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "low",
"timestamp": "2026-01-03T22:36:00Z",
"trace_id": "cec9ab1d-e83d-8e92-cb8d-3ae8dc08c22a"
} | {
"account_age_days": 236,
"account_id": "ACCT-6D473FE6E6E3",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_2",
"session_entropy": 0.159
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 318,
"timestamp": "2026-01-03T21:17:00Z",
"transaction_amount_usd": 8.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.409,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4498659.51,
"financial_exposure_usd": 4738478.73,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105371",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "medium",
"timestamp": "2026-01-04T17:31:00Z",
"trace_id": "3db4bf13-0e9d-2d53-bedc-069b6735632b"
} | {
"account_age_days": 1608,
"account_id": "ACCT-E535BBF5C5B2",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_3",
"session_entropy": 0.148
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 555,
"timestamp": "2026-01-04T17:31:00Z",
"transaction_amount_usd": 2644772.52
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3666067.64,
"financial_exposure_usd": 6501714.87,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108483",
"label": "benign",
"label_confidence": 0.574,
"severity": "low",
"timestamp": "2026-01-06T21:23:00Z",
"trace_id": "028b3898-4b90-e8e4-8d6e-76102e8c9bf7"
} | {
"account_age_days": 190,
"account_id": "ACCT-79102E48AC8B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.542
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 170,
"timestamp": "2026-01-06T12:58:00Z",
"transaction_amount_usd": 22.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1844.44,
"financial_exposure_usd": 3887.73,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108043",
"label": "benign",
"label_confidence": 0.691,
"severity": "high",
"timestamp": "2026-01-06T14:03:00Z",
"trace_id": "43629f9d-0dba-620b-081f-fef9f0ba6b30"
} | {
"account_age_days": 527,
"account_id": "ACCT-10E5FA9312D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 392,
"timestamp": "2026-01-06T01:33:00Z",
"transaction_amount_usd": 7.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.512,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3787.19,
"financial_exposure_usd": 4276.12,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102597",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-02T19:17:00Z",
"trace_id": "2edaf4d4-9c9b-3fe4-441b-fd2c57b73def"
} | {
"account_age_days": 1445,
"account_id": "ACCT-190821144478",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_1",
"session_entropy": 0.716
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 390,
"timestamp": "2026-01-02T19:17:00Z",
"transaction_amount_usd": 98607.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.457,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1163624.78,
"financial_exposure_usd": 1229166.39,
"recoverable_pct": 0.381
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101908",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "critical",
"timestamp": "2026-01-02T07:48:00Z",
"trace_id": "24cea55f-ddae-4763-7d5f-6b78d62d02d3"
} | {
"account_age_days": 754,
"account_id": "ACCT-3236CE823D45",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_3",
"session_entropy": 0.601
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 674,
"timestamp": "2026-01-02T07:48:00Z",
"transaction_amount_usd": 12837.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 524796.87,
"financial_exposure_usd": 735632.21,
"recoverable_pct": 0.334
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101477",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "low",
"timestamp": "2026-01-02T00:37:00Z",
"trace_id": "29c88ba5-d579-a4fc-84a2-79819a474f4d"
} | {
"account_age_days": 1544,
"account_id": "ACCT-3D40B72A8075",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_1",
"session_entropy": 0.15
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 700,
"timestamp": "2026-01-02T00:37:00Z",
"transaction_amount_usd": 108960.53
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.355,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 468770.36,
"financial_exposure_usd": 659211.57,
"recoverable_pct": 0.144
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109542",
"label": "benign",
"label_confidence": 0.67,
"severity": "medium",
"timestamp": "2026-01-07T15:02:00Z",
"trace_id": "f9f65dc3-92ec-4ca2-dedc-b6a67d2b9393"
} | {
"account_age_days": 1633,
"account_id": "ACCT-E0BE9A590F87",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_2",
"session_entropy": 0.368
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1146,
"timestamp": "2026-01-07T15:02:00Z",
"transaction_amount_usd": 10789.53
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2362.36,
"financial_exposure_usd": 3015.68,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103154",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "medium",
"timestamp": "2026-01-03T04:34:00Z",
"trace_id": "1f13b56c-4109-1927-ff24-c6fb584d8ce4"
} | {
"account_age_days": 841,
"account_id": "ACCT-A553970C6D92",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_3",
"session_entropy": 0.839
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1132,
"timestamp": "2026-01-03T04:34:00Z",
"transaction_amount_usd": 3459.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.928,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 323678.65,
"financial_exposure_usd": 408008.25,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109861",
"label": "benign",
"label_confidence": 0.509,
"severity": "low",
"timestamp": "2026-01-07T20:21:00Z",
"trace_id": "d5ef28d5-8f57-1f64-09ae-3a7150e8c63e"
} | {
"account_age_days": 1382,
"account_id": "ACCT-1AB5C8354A2A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.135
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 795,
"timestamp": "2026-01-07T20:21:00Z",
"transaction_amount_usd": 10022.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1579.14,
"financial_exposure_usd": 1915.71,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108794",
"label": "benign",
"label_confidence": 0.74,
"severity": "critical",
"timestamp": "2026-01-07T02:34:00Z",
"trace_id": "729cfb53-f121-c839-83b6-bc5a336fcfc2"
} | {
"account_age_days": 1901,
"account_id": "ACCT-6F4D14DA210B",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.454
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 246,
"timestamp": "2026-01-06T16:12:00Z",
"transaction_amount_usd": 21.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2573.44,
"financial_exposure_usd": 4603.78,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103994",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-03T18:34:00Z",
"trace_id": "47f7dc75-e1bc-c6b7-762d-fdabc6e93a7d"
} | {
"account_age_days": 163,
"account_id": "ACCT-DFCC150A1EF6",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_2",
"session_entropy": 0.58
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 811,
"timestamp": "2026-01-03T18:34:00Z",
"transaction_amount_usd": 2944940.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1357526.11,
"financial_exposure_usd": 2035164.08,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106984",
"label": "benign",
"label_confidence": 0.46,
"severity": "low",
"timestamp": "2026-01-05T20:24:00Z",
"trace_id": "8037aaff-8c26-b611-01cd-e017bc2d9601"
} | {
"account_age_days": 742,
"account_id": "ACCT-FEE4A58CDBC0",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_1",
"session_entropy": 0.737
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1047,
"timestamp": "2026-01-05T20:24:00Z",
"transaction_amount_usd": 277.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2713.43,
"financial_exposure_usd": 3026.66,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107883",
"label": "benign",
"label_confidence": 0.504,
"severity": "high",
"timestamp": "2026-01-06T11:23:00Z",
"trace_id": "e587ae87-9567-904b-0cf7-8fb0b365008a"
} | {
"account_age_days": 464,
"account_id": "ACCT-EAA09C0EA43D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.125
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 196,
"timestamp": "2026-01-06T11:23:00Z",
"transaction_amount_usd": 12837.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1659.71,
"financial_exposure_usd": 2688.77,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104863",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-04T09:03:00Z",
"trace_id": "0f74a1a6-a561-a895-084a-a433e7d79a83"
} | {
"account_age_days": 878,
"account_id": "ACCT-61BC63F1ECA8",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_1",
"session_entropy": 0.936
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 100,
"timestamp": "2026-01-04T09:03:00Z",
"transaction_amount_usd": 460141.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.808,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 808068.61,
"financial_exposure_usd": 1060538.15,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109718",
"label": "benign",
"label_confidence": 0.646,
"severity": "low",
"timestamp": "2026-01-07T17:58:00Z",
"trace_id": "64f0971a-6791-4513-a828-3400d806a0d5"
} | {
"account_age_days": 351,
"account_id": "ACCT-3FA656571405",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.126
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 195,
"timestamp": "2026-01-07T17:58:00Z",
"transaction_amount_usd": 2450.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3888.25,
"financial_exposure_usd": 5074.06,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100482",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "high",
"timestamp": "2026-01-01T08:02:00Z",
"trace_id": "ba2181f7-a659-6289-c03f-32ef1627e3cf"
} | {
"account_age_days": 483,
"account_id": "ACCT-E3A94B00F6C2",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_2",
"session_entropy": 0.857
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 203,
"timestamp": "2026-01-01T08:02:00Z",
"transaction_amount_usd": 66296.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 321668.63,
"financial_exposure_usd": 400368.25,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100580",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "medium",
"timestamp": "2026-01-01T09:40:00Z",
"trace_id": "2a8b4b9f-cdd9-6308-33d8-fd67a3cc4e45"
} | {
"account_age_days": 565,
"account_id": "ACCT-E953DEA61844",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_2",
"session_entropy": 0.527
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 305,
"timestamp": "2026-01-01T09:40:00Z",
"transaction_amount_usd": 88808.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.517,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 195837.39,
"financial_exposure_usd": 331378.17,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103717",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "critical",
"timestamp": "2026-01-03T13:57:00Z",
"trace_id": "3c9b884b-e6bc-f071-b89f-98b17cb782d0"
} | {
"account_age_days": 27,
"account_id": "ACCT-861A9BEB82CC",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_2",
"session_entropy": 0.822
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 84,
"timestamp": "2026-01-03T03:58:00Z",
"transaction_amount_usd": 11.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.879,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2587044.42,
"financial_exposure_usd": 4762361,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102257",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "high",
"timestamp": "2026-01-02T13:37:00Z",
"trace_id": "6fc7beb2-5326-3cab-a5d2-65b45cee4d54"
} | {
"account_age_days": 1487,
"account_id": "ACCT-0851D87C74F2",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_1",
"session_entropy": 0.163
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 150,
"timestamp": "2026-01-02T08:45:00Z",
"transaction_amount_usd": 10.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.726,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 421981.42,
"financial_exposure_usd": 949195.54,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.