schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102025",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "high",
"timestamp": "2026-01-02T09:45:00Z",
"trace_id": "f15991f9-687a-a19b-431f-086cdaf99cba"
} | {
"account_age_days": 993,
"account_id": "ACCT-2D768E20193D",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1099,
"timestamp": "2026-01-02T09:45:00Z",
"transaction_amount_usd": 18337.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.689,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 795084.16,
"financial_exposure_usd": 1300574.58,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105539",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "low",
"timestamp": "2026-01-04T20:19:00Z",
"trace_id": "0e94100c-825d-e973-8562-9eb9109042b6"
} | {
"account_age_days": 1717,
"account_id": "ACCT-26906476FAD2",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_1",
"session_entropy": 0.132
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1072,
"timestamp": "2026-01-04T20:19:00Z",
"transaction_amount_usd": 1220203.91
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.422,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2344041.9,
"financial_exposure_usd": 2601874.73,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106410",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "high",
"timestamp": "2026-01-05T10:50:00Z",
"trace_id": "c1cfc0a3-f083-6ad9-e445-a5a816298f34"
} | {
"account_age_days": 183,
"account_id": "ACCT-94C7F3D3A45C",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_2",
"session_entropy": 0.84
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 280,
"timestamp": "2026-01-05T09:03:00Z",
"transaction_amount_usd": 19.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.817,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5504238.92,
"financial_exposure_usd": 6142394.08,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108082",
"label": "benign",
"label_confidence": 0.527,
"severity": "low",
"timestamp": "2026-01-06T14:42:00Z",
"trace_id": "65e65e84-0431-80c3-7c15-9744a0690bf5"
} | {
"account_age_days": 149,
"account_id": "ACCT-2BFE65D70062",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.117
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1174,
"timestamp": "2026-01-06T14:42:00Z",
"transaction_amount_usd": 1499.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 643.85,
"financial_exposure_usd": 894.01,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108798",
"label": "benign",
"label_confidence": 0.704,
"severity": "medium",
"timestamp": "2026-01-07T02:38:00Z",
"trace_id": "7a3e474b-e821-9024-06a3-0fdcfb65412c"
} | {
"account_age_days": 826,
"account_id": "ACCT-B2D5FED740F4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.347
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 250,
"timestamp": "2026-01-07T02:38:00Z",
"transaction_amount_usd": 13795.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 613.96,
"financial_exposure_usd": 1423.85,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105106",
"label": "fraudulent",
"label_confidence": 0.687,
"severity": "low",
"timestamp": "2026-01-04T13:06:00Z",
"trace_id": "fb9f523c-0aa4-1a87-4d4c-ce67a1a8587e"
} | {
"account_age_days": 913,
"account_id": "ACCT-F19F5CF00223",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.848
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 199,
"timestamp": "2026-01-04T08:14:00Z",
"transaction_amount_usd": 24.96
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2426434.04,
"financial_exposure_usd": 4888124.54,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104044",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "high",
"timestamp": "2026-01-03T19:24:00Z",
"trace_id": "95959683-0ed8-bc48-6120-c318cda6ea36"
} | {
"account_age_days": 1095,
"account_id": "ACCT-0732A1FC609A",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_3",
"session_entropy": 0.614
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 173,
"timestamp": "2026-01-03T19:24:00Z",
"transaction_amount_usd": 805007.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.789,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2364611.73,
"financial_exposure_usd": 5736413.79,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101667",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "critical",
"timestamp": "2026-01-02T03:47:00Z",
"trace_id": "def4337c-99b0-7d11-fc86-6632980aa8c9"
} | {
"account_age_days": 1768,
"account_id": "ACCT-48161DDF5FA8",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_2",
"session_entropy": 0.271
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 444,
"timestamp": "2026-01-02T03:47:00Z",
"transaction_amount_usd": 19879.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.638,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 221769.61,
"financial_exposure_usd": 550268.19,
"recoverable_pct": 0.313
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107182",
"label": "benign",
"label_confidence": 0.542,
"severity": "low",
"timestamp": "2026-01-05T23:42:00Z",
"trace_id": "6405023c-92f6-cbdc-dd16-1874cde8ee79"
} | {
"account_age_days": 51,
"account_id": "ACCT-DF4CA9D671D5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.907
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 143,
"timestamp": "2026-01-05T23:42:00Z",
"transaction_amount_usd": 11976.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3592.72,
"financial_exposure_usd": 7553.61,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103117",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "medium",
"timestamp": "2026-01-03T03:57:00Z",
"trace_id": "33174ee7-97e6-7e51-5804-d02fd9f772e0"
} | {
"account_age_days": 414,
"account_id": "ACCT-E47FB86C4D73",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_1",
"session_entropy": 0.209
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 267,
"timestamp": "2026-01-02T21:31:00Z",
"transaction_amount_usd": 6.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 618629.22,
"financial_exposure_usd": 886347.26,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103004",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "medium",
"timestamp": "2026-01-03T02:04:00Z",
"trace_id": "58744958-bf11-435e-ca6e-11fe3c6b39fd"
} | {
"account_age_days": 1375,
"account_id": "ACCT-5E5F7C1A8E3E",
"baseline_risk_score": 0.613,
"kyc_tier": "tier_2",
"session_entropy": 0.255
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 318,
"timestamp": "2026-01-02T22:01:00Z",
"transaction_amount_usd": 9.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.759,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 187280.32,
"financial_exposure_usd": 366218.16,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100248",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-01T04:08:00Z",
"trace_id": "70ce68ab-7ec9-ef95-e54d-ce58044e2d9b"
} | {
"account_age_days": 1692,
"account_id": "ACCT-C016215D3807",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_3",
"session_entropy": 0.459
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 905,
"timestamp": "2026-01-01T04:08:00Z",
"transaction_amount_usd": 47193.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 388765.43,
"financial_exposure_usd": 534262.33,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101798",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "low",
"timestamp": "2026-01-02T05:58:00Z",
"trace_id": "b187b337-3132-e376-e500-9340102092ae"
} | {
"account_age_days": 236,
"account_id": "ACCT-DFC332BF55CD",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_2",
"session_entropy": 0.739
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 158,
"timestamp": "2026-01-01T18:14:00Z",
"transaction_amount_usd": 9.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.534,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 413937.93,
"financial_exposure_usd": 747943.26,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106818",
"label": "benign",
"label_confidence": 0.727,
"severity": "low",
"timestamp": "2026-01-05T17:38:00Z",
"trace_id": "655373dd-a01c-b42c-3577-a84dc035327f"
} | {
"account_age_days": 1552,
"account_id": "ACCT-1648531EC564",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.583
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1063,
"timestamp": "2026-01-05T17:38:00Z",
"transaction_amount_usd": 8755.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.533,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 680.23,
"financial_exposure_usd": 724.33,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105861",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "high",
"timestamp": "2026-01-05T01:41:00Z",
"trace_id": "09d44db3-57ed-e0a1-4866-d9d0b3a8a1b4"
} | {
"account_age_days": 1887,
"account_id": "ACCT-53EEFF6BD6AD",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_2",
"session_entropy": 0.937
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 798,
"timestamp": "2026-01-05T01:41:00Z",
"transaction_amount_usd": 2303561.18
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.607,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2055627.99,
"financial_exposure_usd": 3445686.28,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105307",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-04T16:27:00Z",
"trace_id": "ac75af7b-16b6-6e4e-9fd7-77db527af540"
} | {
"account_age_days": 346,
"account_id": "ACCT-85401504BEAA",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_3",
"session_entropy": 0.125
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 292,
"timestamp": "2026-01-04T08:25:00Z",
"transaction_amount_usd": 7.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2519979.44,
"financial_exposure_usd": 4547477.82,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108285",
"label": "benign",
"label_confidence": 0.476,
"severity": "low",
"timestamp": "2026-01-06T18:05:00Z",
"trace_id": "5209489d-28ea-20b8-6f3a-942dedbf6917"
} | {
"account_age_days": 910,
"account_id": "ACCT-08BCF92676B6",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_1",
"session_entropy": 0.216
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1167,
"timestamp": "2026-01-06T18:05:00Z",
"transaction_amount_usd": 7288.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 4671.11,
"financial_exposure_usd": 7448.33,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104385",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "medium",
"timestamp": "2026-01-04T01:05:00Z",
"trace_id": "f366f278-49d7-0cea-8ab3-40e0c23f1107"
} | {
"account_age_days": 995,
"account_id": "ACCT-1BFA0911F59A",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_3",
"session_entropy": 0.325
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 257,
"timestamp": "2026-01-03T22:05:00Z",
"transaction_amount_usd": 24.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.459,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3016800.78,
"financial_exposure_usd": 3723498.81,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100434",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "low",
"timestamp": "2026-01-01T07:14:00Z",
"trace_id": "44e12017-e356-fae8-de52-54330e38c346"
} | {
"account_age_days": 2000,
"account_id": "ACCT-9BFB5F8A7F10",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.934
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 280,
"timestamp": "2026-01-01T07:14:00Z",
"transaction_amount_usd": 104996.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 995015.08,
"financial_exposure_usd": 1630534.66,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109912",
"label": "benign",
"label_confidence": 0.545,
"severity": "low",
"timestamp": "2026-01-07T21:12:00Z",
"trace_id": "a72a8be7-3559-4bd2-e0aa-0cf0280c8bfd"
} | {
"account_age_days": 1558,
"account_id": "ACCT-EC4D479DF7AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.636
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 383,
"timestamp": "2026-01-07T20:15:00Z",
"transaction_amount_usd": 0.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1324.02,
"financial_exposure_usd": 1405.49,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100389",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "critical",
"timestamp": "2026-01-01T06:29:00Z",
"trace_id": "0d6b15ec-96de-8576-09a7-c5f9b8ee0531"
} | {
"account_age_days": 1770,
"account_id": "ACCT-12DABC463864",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_1",
"session_entropy": 0.944
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 87,
"timestamp": "2026-01-01T06:29:00Z",
"transaction_amount_usd": 70842.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 915686.2,
"financial_exposure_usd": 1138055.53,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100458",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "medium",
"timestamp": "2026-01-01T07:38:00Z",
"trace_id": "07ef20f7-6418-861e-b07a-810a1befa085"
} | {
"account_age_days": 1956,
"account_id": "ACCT-9AA0B64C967E",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_3",
"session_entropy": 0.389
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 107,
"timestamp": "2026-01-01T02:42:00Z",
"transaction_amount_usd": 23.87
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.759,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1019544.69,
"financial_exposure_usd": 1218345.48,
"recoverable_pct": 0.191
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108412",
"label": "benign",
"label_confidence": 0.481,
"severity": "medium",
"timestamp": "2026-01-06T20:12:00Z",
"trace_id": "4fae15bf-8bc5-aaf4-eaa1-1275737b3328"
} | {
"account_age_days": 1068,
"account_id": "ACCT-72E14F21D2D5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.314
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 516,
"timestamp": "2026-01-06T20:12:00Z",
"transaction_amount_usd": 11874.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1576.9,
"financial_exposure_usd": 1786.21,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102522",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-02T18:02:00Z",
"trace_id": "0d92514c-7831-3bf8-b3cb-3740deb683a6"
} | {
"account_age_days": 552,
"account_id": "ACCT-14744F752B5F",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.422
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 188,
"timestamp": "2026-01-02T18:02:00Z",
"transaction_amount_usd": 87656.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.929,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 517604.37,
"financial_exposure_usd": 801189.54,
"recoverable_pct": 0.185
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108902",
"label": "benign",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-07T04:22:00Z",
"trace_id": "7076a249-c010-f138-61c7-439e936214be"
} | {
"account_age_days": 486,
"account_id": "ACCT-8A5793A778A5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.412
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 942,
"timestamp": "2026-01-07T04:22:00Z",
"transaction_amount_usd": 433.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.613,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4599.89,
"financial_exposure_usd": 6009.25,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101552",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "high",
"timestamp": "2026-01-02T01:52:00Z",
"trace_id": "9b42ff91-7a39-2c07-ffd8-c462f2ac44d6"
} | {
"account_age_days": 1033,
"account_id": "ACCT-A34168E19719",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.468
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 575,
"timestamp": "2026-01-02T01:52:00Z",
"transaction_amount_usd": 48250.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 163730.46,
"financial_exposure_usd": 223263.16,
"recoverable_pct": 0.064
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101873",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "medium",
"timestamp": "2026-01-02T07:13:00Z",
"trace_id": "8d9da2cf-3671-adfa-8cde-6d424191199b"
} | {
"account_age_days": 1481,
"account_id": "ACCT-D2B7B7278985",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_1",
"session_entropy": 0.498
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1180,
"timestamp": "2026-01-02T07:13:00Z",
"transaction_amount_usd": 60176.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.555,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 837986.88,
"financial_exposure_usd": 908722.43,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103828",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-03T15:48:00Z",
"trace_id": "3b7195d6-7fe0-2c19-582e-753a9c05161e"
} | {
"account_age_days": 783,
"account_id": "ACCT-17E4A6B5A76C",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_3",
"session_entropy": 0.691
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 536,
"timestamp": "2026-01-03T15:48:00Z",
"transaction_amount_usd": 2339294.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.513,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2228500.41,
"financial_exposure_usd": 3273950.75,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100518",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-01T08:38:00Z",
"trace_id": "1bc2c57a-8778-bddc-6174-64305fc5ce27"
} | {
"account_age_days": 28,
"account_id": "ACCT-6457555142CE",
"baseline_risk_score": 0.646,
"kyc_tier": "tier_2",
"session_entropy": 0.253
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 564,
"timestamp": "2026-01-01T08:38:00Z",
"transaction_amount_usd": 53611.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.878,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 482673,
"financial_exposure_usd": 736649.84,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106400",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "critical",
"timestamp": "2026-01-05T10:40:00Z",
"trace_id": "96337563-95bd-3a13-8d42-99310f15dcfe"
} | {
"account_age_days": 633,
"account_id": "ACCT-5A206F3E58C6",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_2",
"session_entropy": 0.601
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 330,
"timestamp": "2026-01-05T03:07:00Z",
"transaction_amount_usd": 16.64
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.756,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2517865.93,
"financial_exposure_usd": 2595974.82,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102590",
"label": "fraudulent",
"label_confidence": 0.976,
"severity": "medium",
"timestamp": "2026-01-02T19:10:00Z",
"trace_id": "0d91ee6a-d66a-5233-b489-664e551ea72d"
} | {
"account_age_days": 1678,
"account_id": "ACCT-0E7189CC7B49",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_3",
"session_entropy": 0.892
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 386,
"timestamp": "2026-01-02T12:02:00Z",
"transaction_amount_usd": 16.26
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 369954.06,
"financial_exposure_usd": 472837.81,
"recoverable_pct": 0.328
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106344",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "medium",
"timestamp": "2026-01-05T09:44:00Z",
"trace_id": "b4c2dba0-515c-10d0-04b6-01fc20fa5753"
} | {
"account_age_days": 152,
"account_id": "ACCT-C0B2530C4038",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_3",
"session_entropy": 0.317
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 387,
"timestamp": "2026-01-05T08:29:00Z",
"transaction_amount_usd": 2.24
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.482,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2842664.4,
"financial_exposure_usd": 3475706.62,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105555",
"label": "fraudulent",
"label_confidence": 0.705,
"severity": "high",
"timestamp": "2026-01-04T20:35:00Z",
"trace_id": "16c8cf26-36bb-a222-3bfc-552b576d2b94"
} | {
"account_age_days": 959,
"account_id": "ACCT-129539F51CF2",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_2",
"session_entropy": 0.364
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1192,
"timestamp": "2026-01-04T20:35:00Z",
"transaction_amount_usd": 1883490.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.367,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2870641.33,
"financial_exposure_usd": 2890478.36,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103477",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "low",
"timestamp": "2026-01-03T09:57:00Z",
"trace_id": "e0f46684-9a28-832d-ae0b-b337c9655d76"
} | {
"account_age_days": 1059,
"account_id": "ACCT-D0D3E8C570D8",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_3",
"session_entropy": 0.12
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 465,
"timestamp": "2026-01-03T09:57:00Z",
"transaction_amount_usd": 2948836.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.394,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1780662.63,
"financial_exposure_usd": 3534233.46,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108186",
"label": "benign",
"label_confidence": 0.743,
"severity": "low",
"timestamp": "2026-01-06T16:26:00Z",
"trace_id": "3442157d-d6b5-0b0e-c01c-9275dfa2451d"
} | {
"account_age_days": 1796,
"account_id": "ACCT-34AB0F9848F0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.852
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 491,
"timestamp": "2026-01-06T16:26:00Z",
"transaction_amount_usd": 5008.35
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3078.55,
"financial_exposure_usd": 7367.68,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104575",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "high",
"timestamp": "2026-01-04T04:15:00Z",
"trace_id": "35c61668-9946-a04d-3b8b-f6c140eb22ed"
} | {
"account_age_days": 1241,
"account_id": "ACCT-A1B430148AEE",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_3",
"session_entropy": 0.198
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 769,
"timestamp": "2026-01-04T04:15:00Z",
"transaction_amount_usd": 1344507.16
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.474,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2444247.74,
"financial_exposure_usd": 5661164.4,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101195",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "critical",
"timestamp": "2026-01-01T19:55:00Z",
"trace_id": "1c66e4d5-c0c6-79b3-34ab-d53e1ac21853"
} | {
"account_age_days": 633,
"account_id": "ACCT-3F825264D6C8",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.105
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 205,
"timestamp": "2026-01-01T19:55:00Z",
"transaction_amount_usd": 70509.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.816,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 918380.94,
"financial_exposure_usd": 998075.79,
"recoverable_pct": 0.037
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100014",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "critical",
"timestamp": "2026-01-01T00:14:00Z",
"trace_id": "b1aa0f6a-2a96-e1e2-7194-eae219bad7ae"
} | {
"account_age_days": 1645,
"account_id": "ACCT-CC8218DAC696",
"baseline_risk_score": 0.548,
"kyc_tier": "tier_2",
"session_entropy": 0.296
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 962,
"timestamp": "2026-01-01T00:14:00Z",
"transaction_amount_usd": 5995.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.732,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 821243.61,
"financial_exposure_usd": 1018080.68,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104998",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "high",
"timestamp": "2026-01-04T11:18:00Z",
"trace_id": "0652fa1c-4a02-1c69-57a0-da63d1a3834d"
} | {
"account_age_days": 1374,
"account_id": "ACCT-0942A251F737",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.197
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 897,
"timestamp": "2026-01-04T11:18:00Z",
"transaction_amount_usd": 1678353.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2318090.02,
"financial_exposure_usd": 2463572.82,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100473",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "critical",
"timestamp": "2026-01-01T07:53:00Z",
"trace_id": "9c39e4eb-112d-894b-dfa8-96db18a5d9f5"
} | {
"account_age_days": 652,
"account_id": "ACCT-5A8458072A2E",
"baseline_risk_score": 0.61,
"kyc_tier": "tier_3",
"session_entropy": 0.506
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 685,
"timestamp": "2026-01-01T07:53:00Z",
"transaction_amount_usd": 11557.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.387,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 482934.87,
"financial_exposure_usd": 848165.01,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103858",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "low",
"timestamp": "2026-01-03T16:18:00Z",
"trace_id": "fd0d2908-98f3-c616-d727-cdf47a1f51b8"
} | {
"account_age_days": 1251,
"account_id": "ACCT-BF12792E5E9C",
"baseline_risk_score": 0.207,
"kyc_tier": "tier_1",
"session_entropy": 0.657
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 350,
"timestamp": "2026-01-03T12:06:00Z",
"transaction_amount_usd": 7.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3072624.71,
"financial_exposure_usd": 3240813.1,
"recoverable_pct": 0.556
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105663",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "high",
"timestamp": "2026-01-04T22:23:00Z",
"trace_id": "bb5bff32-ffaa-cad8-6fff-60989a8b5d5f"
} | {
"account_age_days": 1519,
"account_id": "ACCT-A1DD6FA87BEB",
"baseline_risk_score": 0.221,
"kyc_tier": "tier_1",
"session_entropy": 0.763
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1077,
"timestamp": "2026-01-04T22:23:00Z",
"transaction_amount_usd": 1467165.91
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.54,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3471420.49,
"financial_exposure_usd": 4901357.93,
"recoverable_pct": 0.961
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101786",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-02T05:46:00Z",
"trace_id": "2956d750-afea-bc2c-d148-93c94606f263"
} | {
"account_age_days": 677,
"account_id": "ACCT-827DF7689A55",
"baseline_risk_score": 0.591,
"kyc_tier": "tier_3",
"session_entropy": 0.566
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 759,
"timestamp": "2026-01-02T05:46:00Z",
"transaction_amount_usd": 42045.01
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.766,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 177120.44,
"financial_exposure_usd": 339879.85,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100694",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "medium",
"timestamp": "2026-01-01T11:34:00Z",
"trace_id": "b3b777ff-1346-fbc0-6b27-00cd974c7e29"
} | {
"account_age_days": 1026,
"account_id": "ACCT-9E030ECC0545",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 550,
"timestamp": "2026-01-01T11:34:00Z",
"transaction_amount_usd": 115757.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.712,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 533448.26,
"financial_exposure_usd": 1102085.19,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103218",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-03T05:38:00Z",
"trace_id": "357c1032-5303-d82d-3bf7-608c12d774df"
} | {
"account_age_days": 536,
"account_id": "ACCT-CA149FA28CF0",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_2",
"session_entropy": 0.553
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 346,
"timestamp": "2026-01-02T19:06:00Z",
"transaction_amount_usd": 21.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.784,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 306560.11,
"financial_exposure_usd": 701023.19,
"recoverable_pct": 0.216
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109265",
"label": "benign",
"label_confidence": 0.73,
"severity": "low",
"timestamp": "2026-01-07T10:25:00Z",
"trace_id": "59f357ab-ab7e-1ebc-7aa6-24f697647117"
} | {
"account_age_days": 1800,
"account_id": "ACCT-D70EB56B9132",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.633
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 209,
"timestamp": "2026-01-07T10:25:00Z",
"transaction_amount_usd": 3332.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2200.57,
"financial_exposure_usd": 2672.32,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103589",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-03T11:49:00Z",
"trace_id": "68efb6e9-44d5-fa7f-ad60-898a87319042"
} | {
"account_age_days": 760,
"account_id": "ACCT-A745E41EFD51",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_1",
"session_entropy": 0.679
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 167,
"timestamp": "2026-01-03T08:23:00Z",
"transaction_amount_usd": 3.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.726,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4523984.24,
"financial_exposure_usd": 4847246.13,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106066",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-05T05:06:00Z",
"trace_id": "d395209a-f9c5-c015-870f-5ecdb0fffafd"
} | {
"account_age_days": 1026,
"account_id": "ACCT-3A6A813DA21C",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_2",
"session_entropy": 0.752
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1058,
"timestamp": "2026-01-05T05:06:00Z",
"transaction_amount_usd": 1942610.04
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.411,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1321236.33,
"financial_exposure_usd": 2236238.37,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103170",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "medium",
"timestamp": "2026-01-03T04:50:00Z",
"trace_id": "10417903-1cbd-9ce9-4f4c-cb6d1d567302"
} | {
"account_age_days": 49,
"account_id": "ACCT-6474B22BFAD0",
"baseline_risk_score": 0.541,
"kyc_tier": "tier_2",
"session_entropy": 0.897
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1000,
"timestamp": "2026-01-03T04:50:00Z",
"transaction_amount_usd": 11536.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.393,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 815721.88,
"financial_exposure_usd": 924262.16,
"recoverable_pct": 0.172
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106914",
"label": "benign",
"label_confidence": 0.523,
"severity": "high",
"timestamp": "2026-01-05T19:14:00Z",
"trace_id": "da95a32f-4eaa-2309-79a2-d44cd2b1f14b"
} | {
"account_age_days": 1519,
"account_id": "ACCT-F423BB97771B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.374
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 366,
"timestamp": "2026-01-05T14:44:00Z",
"transaction_amount_usd": 19.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.521,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3560.61,
"financial_exposure_usd": 4625.92,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106053",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-05T04:53:00Z",
"trace_id": "bc0ee612-109f-00c7-ad94-bd46d5016c39"
} | {
"account_age_days": 917,
"account_id": "ACCT-7624AB1EFBC0",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_3",
"session_entropy": 0.146
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 712,
"timestamp": "2026-01-05T04:53:00Z",
"transaction_amount_usd": 2962037.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4618107.44,
"financial_exposure_usd": 4730553.68,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103395",
"label": "fraudulent",
"label_confidence": 0.71,
"severity": "medium",
"timestamp": "2026-01-03T08:35:00Z",
"trace_id": "fbd304b1-0707-35cc-41bb-0cb6d408b15c"
} | {
"account_age_days": 684,
"account_id": "ACCT-DE4DD681133D",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_3",
"session_entropy": 0.838
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 103,
"timestamp": "2026-01-03T08:35:00Z",
"transaction_amount_usd": 1757444.52
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.836,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3223783.75,
"financial_exposure_usd": 3865411.81,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107212",
"label": "benign",
"label_confidence": 0.512,
"severity": "critical",
"timestamp": "2026-01-06T00:12:00Z",
"trace_id": "893a87cd-cb42-c800-a31a-591ba01607ad"
} | {
"account_age_days": 907,
"account_id": "ACCT-D074F5349C12",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_1",
"session_entropy": 0.893
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 308,
"timestamp": "2026-01-06T00:12:00Z",
"transaction_amount_usd": 4678.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2738.23,
"financial_exposure_usd": 2757.82,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104140",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-03T21:00:00Z",
"trace_id": "3fb2891b-bfbb-36b8-8da4-724592bcd0a4"
} | {
"account_age_days": 1972,
"account_id": "ACCT-A59C39CC34FE",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_2",
"session_entropy": 0.786
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1130,
"timestamp": "2026-01-03T21:00:00Z",
"transaction_amount_usd": 183511.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2382549.72,
"financial_exposure_usd": 5820586.87,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106357",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "critical",
"timestamp": "2026-01-05T09:57:00Z",
"trace_id": "17191d13-9013-3f83-5b48-d6952e8ba1c9"
} | {
"account_age_days": 429,
"account_id": "ACCT-5E00493F44E2",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_3",
"session_entropy": 0.55
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 374,
"timestamp": "2026-01-05T09:57:00Z",
"transaction_amount_usd": 1887053.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4810874.72,
"financial_exposure_usd": 4912115.95,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106214",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-05T07:34:00Z",
"trace_id": "3cf53446-c991-b3c1-e10b-81a9ac401ebe"
} | {
"account_age_days": 1237,
"account_id": "ACCT-AD6C885E83DB",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.259
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1160,
"timestamp": "2026-01-05T07:34:00Z",
"transaction_amount_usd": 2291944.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.386,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 843309.58,
"financial_exposure_usd": 912329.23,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109166",
"label": "benign",
"label_confidence": 0.693,
"severity": "medium",
"timestamp": "2026-01-07T08:46:00Z",
"trace_id": "21bfc840-1867-7c6f-c3a7-a114e59c4e4e"
} | {
"account_age_days": 1090,
"account_id": "ACCT-8D0F632000AD",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_1",
"session_entropy": 0.745
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 219,
"timestamp": "2026-01-06T23:54:00Z",
"transaction_amount_usd": 22.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1511.47,
"financial_exposure_usd": 3065.59,
"recoverable_pct": 0.451
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105748",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-04T23:48:00Z",
"trace_id": "c45bc680-f1c9-0eb1-f20f-abea7208f6e6"
} | {
"account_age_days": 1236,
"account_id": "ACCT-799AE507668A",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.845
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 846,
"timestamp": "2026-01-04T23:48:00Z",
"transaction_amount_usd": 2231034.79
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.895,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4145721.77,
"financial_exposure_usd": 4739101.43,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106800",
"label": "benign",
"label_confidence": 0.46,
"severity": "medium",
"timestamp": "2026-01-05T17:20:00Z",
"trace_id": "dfb5680d-a318-4a71-44f7-d04eed231bf9"
} | {
"account_age_days": 626,
"account_id": "ACCT-9CBB573CEA23",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.809
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 508,
"timestamp": "2026-01-05T17:20:00Z",
"transaction_amount_usd": 7332.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1057.83,
"financial_exposure_usd": 2228.23,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101384",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "critical",
"timestamp": "2026-01-01T23:04:00Z",
"trace_id": "6d569dfd-330f-a70d-2048-60ce8534c9d1"
} | {
"account_age_days": 55,
"account_id": "ACCT-6C4A60DF2218",
"baseline_risk_score": 0.57,
"kyc_tier": "tier_2",
"session_entropy": 0.676
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 382,
"timestamp": "2026-01-01T23:04:00Z",
"transaction_amount_usd": 59615.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.706,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 384755.1,
"financial_exposure_usd": 576361.89,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104361",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "medium",
"timestamp": "2026-01-04T00:41:00Z",
"trace_id": "d1064806-87c3-d1be-899d-a7ce84fc8ee3"
} | {
"account_age_days": 1020,
"account_id": "ACCT-2E061A21F555",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.591
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 99,
"timestamp": "2026-01-04T00:41:00Z",
"transaction_amount_usd": 798264.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.847,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1747279.48,
"financial_exposure_usd": 2519470.79,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104573",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "medium",
"timestamp": "2026-01-04T04:13:00Z",
"trace_id": "838407c8-97a0-9ffd-d85f-9fe31cc386f0"
} | {
"account_age_days": 136,
"account_id": "ACCT-A72F6E24762B",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.579
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 434,
"timestamp": "2026-01-04T04:13:00Z",
"transaction_amount_usd": 644108.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.617,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 941915.66,
"financial_exposure_usd": 1925817.87,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102286",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "low",
"timestamp": "2026-01-02T14:06:00Z",
"trace_id": "36257d7a-c0ef-5add-de95-400dd5632d8d"
} | {
"account_age_days": 1153,
"account_id": "ACCT-BBEE4925479C",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_1",
"session_entropy": 0.931
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 548,
"timestamp": "2026-01-02T14:06:00Z",
"transaction_amount_usd": 118790.75
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1170166.37,
"financial_exposure_usd": 1291343.58,
"recoverable_pct": 0.211
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103514",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-03T10:34:00Z",
"trace_id": "5d2a51a8-593e-8969-7c6c-c487974462ce"
} | {
"account_age_days": 1872,
"account_id": "ACCT-D78F70B5E0AC",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_1",
"session_entropy": 0.295
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 993,
"timestamp": "2026-01-03T10:34:00Z",
"transaction_amount_usd": 2962617.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7564088.58,
"financial_exposure_usd": 9156087.27,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107995",
"label": "benign",
"label_confidence": 0.631,
"severity": "high",
"timestamp": "2026-01-06T13:15:00Z",
"trace_id": "49aca6d7-ad0d-1cdf-ee32-abcb0272cecf"
} | {
"account_age_days": 1413,
"account_id": "ACCT-8A304F0F1D48",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.332
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 880,
"timestamp": "2026-01-06T13:15:00Z",
"transaction_amount_usd": 8364.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.52,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1514.31,
"financial_exposure_usd": 2631.96,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103478",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-03T09:58:00Z",
"trace_id": "f93a45d9-2e7f-30e4-9d81-7ffa0abf268b"
} | {
"account_age_days": 1790,
"account_id": "ACCT-FA52AF9354D2",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_1",
"session_entropy": 0.694
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 530,
"timestamp": "2026-01-03T09:58:00Z",
"transaction_amount_usd": 1429233.55
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.839,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5254368.75,
"financial_exposure_usd": 8066159.55,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102441",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-02T16:41:00Z",
"trace_id": "d77e0943-fd30-2ed9-1181-b3ef7ed2a5b7"
} | {
"account_age_days": 873,
"account_id": "ACCT-78CB9BB84952",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_3",
"session_entropy": 0.457
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1101,
"timestamp": "2026-01-02T16:41:00Z",
"transaction_amount_usd": 64043.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.585,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 537434,
"financial_exposure_usd": 714884.09,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103217",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-03T05:37:00Z",
"trace_id": "0597c339-e17f-a8e2-d852-c18084175d82"
} | {
"account_age_days": 1111,
"account_id": "ACCT-06F4E19B7DED",
"baseline_risk_score": 0.463,
"kyc_tier": "tier_3",
"session_entropy": 0.465
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1125,
"timestamp": "2026-01-03T05:37:00Z",
"transaction_amount_usd": 71617.64
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.554,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 727936.59,
"financial_exposure_usd": 832254.4,
"recoverable_pct": 0.129
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108143",
"label": "benign",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-06T15:43:00Z",
"trace_id": "0a0e0502-0f43-b608-c0dc-89aa2394012a"
} | {
"account_age_days": 127,
"account_id": "ACCT-C73411D5356F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.686
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 81,
"timestamp": "2026-01-06T04:47:00Z",
"transaction_amount_usd": 1.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.764,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 689.15,
"financial_exposure_usd": 1634.8,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106078",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-05T05:18:00Z",
"trace_id": "6e69d92e-2137-7acf-2c89-c937e742621f"
} | {
"account_age_days": 308,
"account_id": "ACCT-9AD19FC4855B",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_3",
"session_entropy": 0.3
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 638,
"timestamp": "2026-01-05T05:18:00Z",
"transaction_amount_usd": 1591110.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.882,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6674176.11,
"financial_exposure_usd": 7532844.89,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100790",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-01T13:10:00Z",
"trace_id": "ced923d6-25bd-8a41-c3f6-6c6879ce0112"
} | {
"account_age_days": 1385,
"account_id": "ACCT-E84EB205DEC8",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.422
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 692,
"timestamp": "2026-01-01T13:10:00Z",
"transaction_amount_usd": 63045.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.911,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 382743.75,
"financial_exposure_usd": 394629.21,
"recoverable_pct": 0.009
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105087",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-04T12:47:00Z",
"trace_id": "2976c850-929c-4c30-74af-6dae4fcc606c"
} | {
"account_age_days": 344,
"account_id": "ACCT-14CDB2132F78",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.106
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 190,
"timestamp": "2026-01-04T12:47:00Z",
"transaction_amount_usd": 1291903.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.622,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2158876.77,
"financial_exposure_usd": 4493345.11,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106525",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-05T12:45:00Z",
"trace_id": "0618d88c-3158-f58b-9217-114bbb13b35e"
} | {
"account_age_days": 1878,
"account_id": "ACCT-215DAC1D5F4F",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 741,
"timestamp": "2026-01-05T12:45:00Z",
"transaction_amount_usd": 2210603.71
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.534,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1811103.08,
"financial_exposure_usd": 3307116,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109464",
"label": "benign",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-07T13:44:00Z",
"trace_id": "2ba30f1e-b1be-46b8-805c-8bba3f41126f"
} | {
"account_age_days": 1166,
"account_id": "ACCT-378EEBE27503",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.326
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 954,
"timestamp": "2026-01-07T13:44:00Z",
"transaction_amount_usd": 6307.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.561,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 442.3,
"financial_exposure_usd": 1067.04,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101406",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-01T23:26:00Z",
"trace_id": "ba69d43c-37b5-9639-c5c4-02249f0dc281"
} | {
"account_age_days": 1836,
"account_id": "ACCT-3D4586DEE387",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_3",
"session_entropy": 0.59
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1198,
"timestamp": "2026-01-01T23:26:00Z",
"transaction_amount_usd": 78361.74
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.566,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 565962.13,
"financial_exposure_usd": 794613.55,
"recoverable_pct": 0.219
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104173",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "medium",
"timestamp": "2026-01-03T21:33:00Z",
"trace_id": "d015283f-de83-9549-7dee-8182b8bbfdc3"
} | {
"account_age_days": 1490,
"account_id": "ACCT-2695838BB0AA",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_3",
"session_entropy": 0.338
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 80,
"timestamp": "2026-01-03T21:33:00Z",
"transaction_amount_usd": 2149828.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.799,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3133196.86,
"financial_exposure_usd": 7030631.71,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104590",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "high",
"timestamp": "2026-01-04T04:30:00Z",
"trace_id": "56639c7d-ff9c-52d8-0036-659f42783ca9"
} | {
"account_age_days": 1635,
"account_id": "ACCT-1FB01D49C68F",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_3",
"session_entropy": 0.749
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 179,
"timestamp": "2026-01-04T01:55:00Z",
"transaction_amount_usd": 1.13
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3759736.29,
"financial_exposure_usd": 5272704.4,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103903",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-03T17:03:00Z",
"trace_id": "3c319076-4bfe-a240-ef1d-262dc5392758"
} | {
"account_age_days": 1769,
"account_id": "ACCT-489512B9641C",
"baseline_risk_score": 0.404,
"kyc_tier": "tier_3",
"session_entropy": 0.701
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 152,
"timestamp": "2026-01-03T15:09:00Z",
"transaction_amount_usd": 11.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.876,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2596692.91,
"financial_exposure_usd": 4405675.77,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109066",
"label": "benign",
"label_confidence": 0.464,
"severity": "medium",
"timestamp": "2026-01-07T07:06:00Z",
"trace_id": "7d8ac378-eb50-7601-ae97-3e71d7c9e06e"
} | {
"account_age_days": 1373,
"account_id": "ACCT-28F53B12A0E3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.266
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 698,
"timestamp": "2026-01-07T07:06:00Z",
"transaction_amount_usd": 9607.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 895.62,
"financial_exposure_usd": 1664.9,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103647",
"label": "fraudulent",
"label_confidence": 0.629,
"severity": "critical",
"timestamp": "2026-01-03T12:47:00Z",
"trace_id": "4eaa036a-49cc-4dfa-1eea-2d1fc6007b09"
} | {
"account_age_days": 961,
"account_id": "ACCT-7E9A9DAA4DE2",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_2",
"session_entropy": 0.717
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1076,
"timestamp": "2026-01-03T12:47:00Z",
"transaction_amount_usd": 1633754.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.426,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1667054.3,
"financial_exposure_usd": 3141613.18,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106020",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "high",
"timestamp": "2026-01-05T04:20:00Z",
"trace_id": "827a421a-8655-13d3-7804-b5c627bbe2fd"
} | {
"account_age_days": 379,
"account_id": "ACCT-F9076B644261",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 318,
"timestamp": "2026-01-05T04:20:00Z",
"transaction_amount_usd": 349545.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.493,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3801657.81,
"financial_exposure_usd": 3837198.57,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101124",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "medium",
"timestamp": "2026-01-01T18:44:00Z",
"trace_id": "3838862f-53f9-aa93-929a-94a9b7f23aed"
} | {
"account_age_days": 735,
"account_id": "ACCT-4B7BB5FB5AB7",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_2",
"session_entropy": 0.743
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 300,
"timestamp": "2026-01-01T09:21:00Z",
"transaction_amount_usd": 12.77
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.55,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 980722.84,
"financial_exposure_usd": 1268534.21,
"recoverable_pct": 0.191
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102432",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "low",
"timestamp": "2026-01-02T16:32:00Z",
"trace_id": "b90a98e0-18e4-cfc1-8b97-ac8c80489dba"
} | {
"account_age_days": 1248,
"account_id": "ACCT-08292E69E07E",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_1",
"session_entropy": 0.328
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 109,
"timestamp": "2026-01-02T09:23:00Z",
"transaction_amount_usd": 3.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 501685.52,
"financial_exposure_usd": 992653.89,
"recoverable_pct": 0.784
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108989",
"label": "benign",
"label_confidence": 0.524,
"severity": "medium",
"timestamp": "2026-01-07T05:49:00Z",
"trace_id": "136b2305-4c2f-8779-1def-dd40260fe8a7"
} | {
"account_age_days": 1529,
"account_id": "ACCT-805B26BA8773",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.221
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 468,
"timestamp": "2026-01-07T05:49:00Z",
"transaction_amount_usd": 1320.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.733,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 890.34,
"financial_exposure_usd": 935.74,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103261",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "medium",
"timestamp": "2026-01-03T06:21:00Z",
"trace_id": "baaf6ff9-8d51-f9ae-765d-266c2c1f6f48"
} | {
"account_age_days": 1721,
"account_id": "ACCT-CF36F5A97B48",
"baseline_risk_score": 0.457,
"kyc_tier": "tier_2",
"session_entropy": 0.339
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 100,
"timestamp": "2026-01-03T06:21:00Z",
"transaction_amount_usd": 1236.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.913,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 558489.71,
"financial_exposure_usd": 561530.19,
"recoverable_pct": 0.019
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102886",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "medium",
"timestamp": "2026-01-03T00:06:00Z",
"trace_id": "23044a29-1e2e-76d7-a63a-a89d96c0e4b6"
} | {
"account_age_days": 1680,
"account_id": "ACCT-121C7221BE1C",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_1",
"session_entropy": 0.514
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 964,
"timestamp": "2026-01-03T00:06:00Z",
"transaction_amount_usd": 60247.3
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.52,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 351897.95,
"financial_exposure_usd": 666129.05,
"recoverable_pct": 0.094
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106062",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "low",
"timestamp": "2026-01-05T05:02:00Z",
"trace_id": "de5cb68b-583f-cde1-a3bf-735fac3ec140"
} | {
"account_age_days": 546,
"account_id": "ACCT-239134137648",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 274,
"timestamp": "2026-01-05T05:02:00Z",
"transaction_amount_usd": 687369.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1925761.86,
"financial_exposure_usd": 3439019.07,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107683",
"label": "benign",
"label_confidence": 0.745,
"severity": "low",
"timestamp": "2026-01-06T08:03:00Z",
"trace_id": "8c678851-76c5-c292-c1ca-e204b0127d3a"
} | {
"account_age_days": 1407,
"account_id": "ACCT-719C4C924A7B",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.272
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 103,
"timestamp": "2026-01-06T03:26:00Z",
"transaction_amount_usd": 5.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.52,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1736.73,
"financial_exposure_usd": 3730.76,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109198",
"label": "benign",
"label_confidence": 0.71,
"severity": "medium",
"timestamp": "2026-01-07T09:18:00Z",
"trace_id": "e2c091e5-9294-11ad-e97a-3fc86e5a8178"
} | {
"account_age_days": 961,
"account_id": "ACCT-4555E0E40882",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_2",
"session_entropy": 0.611
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1142,
"timestamp": "2026-01-07T09:18:00Z",
"transaction_amount_usd": 14972.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 544.94,
"financial_exposure_usd": 939.49,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107258",
"label": "benign",
"label_confidence": 0.58,
"severity": "low",
"timestamp": "2026-01-06T00:58:00Z",
"trace_id": "9589944e-0115-ca05-de5f-1b27cc8d1efc"
} | {
"account_age_days": 878,
"account_id": "ACCT-81D94403BD0C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.515
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 769,
"timestamp": "2026-01-06T00:58:00Z",
"transaction_amount_usd": 3669.58
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5217.54,
"financial_exposure_usd": 5893.55,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105713",
"label": "fraudulent",
"label_confidence": 0.773,
"severity": "medium",
"timestamp": "2026-01-04T23:13:00Z",
"trace_id": "8ffd8ca9-3a6b-cbcd-5f25-b8fa0bc97583"
} | {
"account_age_days": 504,
"account_id": "ACCT-8F867F81237C",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_1",
"session_entropy": 0.754
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1139,
"timestamp": "2026-01-04T23:13:00Z",
"transaction_amount_usd": 2936467.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4601629.97,
"financial_exposure_usd": 6673926.61,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101474",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-02T00:34:00Z",
"trace_id": "7475acd9-8973-19a3-2023-5763456fccac"
} | {
"account_age_days": 192,
"account_id": "ACCT-939C0C0A824C",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_1",
"session_entropy": 0.703
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 83,
"timestamp": "2026-01-01T20:42:00Z",
"transaction_amount_usd": 20.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.562,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 276419.57,
"financial_exposure_usd": 659525.35,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109308",
"label": "benign",
"label_confidence": 0.599,
"severity": "medium",
"timestamp": "2026-01-07T11:08:00Z",
"trace_id": "3aab7c7f-565d-8821-a1d5-8f6fe86e3986"
} | {
"account_age_days": 303,
"account_id": "ACCT-F2EAE729E588",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.62
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 328,
"timestamp": "2026-01-07T09:51:00Z",
"transaction_amount_usd": 12.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5143.98,
"financial_exposure_usd": 5699.57,
"recoverable_pct": 0.98
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102880",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "high",
"timestamp": "2026-01-03T00:00:00Z",
"trace_id": "9ba88259-9914-3db9-9d88-31f519fbb913"
} | {
"account_age_days": 1011,
"account_id": "ACCT-8CF6AB0DABB4",
"baseline_risk_score": 0.47,
"kyc_tier": "tier_1",
"session_entropy": 0.701
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 203,
"timestamp": "2026-01-02T16:20:00Z",
"transaction_amount_usd": 1.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.486,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 650438.36,
"financial_exposure_usd": 1041083.36,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107915",
"label": "benign",
"label_confidence": 0.648,
"severity": "high",
"timestamp": "2026-01-06T11:55:00Z",
"trace_id": "21438fd6-86d4-44bb-cad0-257b7e83bd70"
} | {
"account_age_days": 1090,
"account_id": "ACCT-B6AF20A403B5",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_1",
"session_entropy": 0.715
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 378,
"timestamp": "2026-01-06T11:55:00Z",
"transaction_amount_usd": 2601.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4673.21,
"financial_exposure_usd": 6047.61,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109428",
"label": "benign",
"label_confidence": 0.518,
"severity": "medium",
"timestamp": "2026-01-07T13:08:00Z",
"trace_id": "08d7da70-93a9-a0ef-4a35-93f85f17e888"
} | {
"account_age_days": 527,
"account_id": "ACCT-A3C9620BC6DC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.829
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1045,
"timestamp": "2026-01-07T13:08:00Z",
"transaction_amount_usd": 152.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 341.31,
"financial_exposure_usd": 627.12,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100958",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "high",
"timestamp": "2026-01-01T15:58:00Z",
"trace_id": "81cc9a26-ce7e-6d5c-a39d-be001e0417b1"
} | {
"account_age_days": 1570,
"account_id": "ACCT-2C7B084D7745",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_2",
"session_entropy": 0.298
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 391,
"timestamp": "2026-01-01T14:58:00Z",
"transaction_amount_usd": 24.41
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.388,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1048083.16,
"financial_exposure_usd": 1211242.88,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105187",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "medium",
"timestamp": "2026-01-04T14:27:00Z",
"trace_id": "62569f88-b76f-139b-cccd-08612d6a8e65"
} | {
"account_age_days": 1872,
"account_id": "ACCT-2121E7DB7CAC",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_1",
"session_entropy": 0.542
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 281,
"timestamp": "2026-01-04T04:44:00Z",
"transaction_amount_usd": 19.32
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3186575.12,
"financial_exposure_usd": 6148830.7,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108108",
"label": "benign",
"label_confidence": 0.659,
"severity": "high",
"timestamp": "2026-01-06T15:08:00Z",
"trace_id": "4dec008e-067d-90e7-7b19-81dabe91221f"
} | {
"account_age_days": 1032,
"account_id": "ACCT-F380F47122E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.94
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1098,
"timestamp": "2026-01-06T15:08:00Z",
"transaction_amount_usd": 11050.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1463.93,
"financial_exposure_usd": 1526.76,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103921",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-03T17:21:00Z",
"trace_id": "847bd276-99a9-a061-2bf1-47eeb6553f69"
} | {
"account_age_days": 1746,
"account_id": "ACCT-542A5ABCC4FB",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_1",
"session_entropy": 0.343
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 425,
"timestamp": "2026-01-03T17:21:00Z",
"transaction_amount_usd": 1219683.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.931,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1346063.54,
"financial_exposure_usd": 1731115.46,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.