schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108413",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-06T20:13:00Z",
"trace_id": "114fe2ca-e0c6-5f5b-2415-6d80f6747c64"
} | {
"account_age_days": 968,
"account_id": "ACCT-747179AC0234",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.151
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1096,
"timestamp": "2026-01-06T20:13:00Z",
"transaction_amount_usd": 12846.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 824.21,
"financial_exposure_usd": 1967,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101827",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "medium",
"timestamp": "2026-01-02T06:27:00Z",
"trace_id": "ae415165-113b-478b-97d2-8f955c0f66f9"
} | {
"account_age_days": 485,
"account_id": "ACCT-DA05FB7E171C",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_1",
"session_entropy": 0.232
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 976,
"timestamp": "2026-01-02T06:27:00Z",
"transaction_amount_usd": 77588.14
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.621,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 428572.44,
"financial_exposure_usd": 540508.66,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108127",
"label": "benign",
"label_confidence": 0.548,
"severity": "high",
"timestamp": "2026-01-06T15:27:00Z",
"trace_id": "a2087411-64a8-52c4-f160-357eaab2c756"
} | {
"account_age_days": 1946,
"account_id": "ACCT-47A459095267",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_1",
"session_entropy": 0.437
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 125,
"timestamp": "2026-01-06T15:27:00Z",
"transaction_amount_usd": 12899.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1369.92,
"financial_exposure_usd": 2786.18,
"recoverable_pct": 0.819
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101812",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "critical",
"timestamp": "2026-01-02T06:12:00Z",
"trace_id": "c825c3e7-c640-aed0-dafe-1b597adff405"
} | {
"account_age_days": 1022,
"account_id": "ACCT-8EDCD66B309C",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.754
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 252,
"timestamp": "2026-01-02T06:12:00Z",
"transaction_amount_usd": 84695.49
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 231594.99,
"financial_exposure_usd": 417191.1,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106922",
"label": "benign",
"label_confidence": 0.483,
"severity": "critical",
"timestamp": "2026-01-05T19:22:00Z",
"trace_id": "fb860596-1332-d2f8-3cfe-034902d63f9d"
} | {
"account_age_days": 1869,
"account_id": "ACCT-9781B84FBF85",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.447
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1157,
"timestamp": "2026-01-05T19:22:00Z",
"transaction_amount_usd": 378.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1506.24,
"financial_exposure_usd": 1700.91,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101486",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-02T00:46:00Z",
"trace_id": "9b6fc39c-c5ea-d10b-ff55-c787287f11e4"
} | {
"account_age_days": 495,
"account_id": "ACCT-6AAE809D798A",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.187
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 635,
"timestamp": "2026-01-02T00:46:00Z",
"transaction_amount_usd": 67166.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.844,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 331240.69,
"financial_exposure_usd": 513301.93,
"recoverable_pct": 0.219
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109533",
"label": "benign",
"label_confidence": 0.647,
"severity": "high",
"timestamp": "2026-01-07T14:53:00Z",
"trace_id": "575b2732-f793-bf4e-71d3-16eed7171163"
} | {
"account_age_days": 425,
"account_id": "ACCT-CE7DB40FBB31",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.237
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 973,
"timestamp": "2026-01-07T14:53:00Z",
"transaction_amount_usd": 3950.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.796,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 978.53,
"financial_exposure_usd": 1623.49,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103276",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-03T06:36:00Z",
"trace_id": "0ef7b497-d08e-0490-f23f-51003aaa2f90"
} | {
"account_age_days": 1488,
"account_id": "ACCT-77D66CFAC26C",
"baseline_risk_score": 0.28,
"kyc_tier": "tier_1",
"session_entropy": 0.923
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 211,
"timestamp": "2026-01-03T06:36:00Z",
"transaction_amount_usd": 90965.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 324261.67,
"financial_exposure_usd": 784594.54,
"recoverable_pct": 0.345
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102331",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "medium",
"timestamp": "2026-01-02T14:51:00Z",
"trace_id": "5d56b4f6-278e-ef40-76b6-9dc53fc279c5"
} | {
"account_age_days": 866,
"account_id": "ACCT-C571378F127C",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_2",
"session_entropy": 0.209
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 995,
"timestamp": "2026-01-02T14:51:00Z",
"transaction_amount_usd": 94073.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.911,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 337469.39,
"financial_exposure_usd": 683298.1,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107150",
"label": "benign",
"label_confidence": 0.565,
"severity": "medium",
"timestamp": "2026-01-05T23:10:00Z",
"trace_id": "db29103a-6aef-dc66-adfe-473f10b679e1"
} | {
"account_age_days": 1074,
"account_id": "ACCT-FCD4C18CEE90",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.475
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 865,
"timestamp": "2026-01-05T23:10:00Z",
"transaction_amount_usd": 8741.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.732,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 349.34,
"financial_exposure_usd": 776.22,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108530",
"label": "benign",
"label_confidence": 0.485,
"severity": "high",
"timestamp": "2026-01-06T22:10:00Z",
"trace_id": "af6e46fe-3b01-f567-e5fc-7c23b6e32dd7"
} | {
"account_age_days": 957,
"account_id": "ACCT-C8B1C930713E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.586
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1048,
"timestamp": "2026-01-06T22:10:00Z",
"transaction_amount_usd": 12029.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.68,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1660.4,
"financial_exposure_usd": 2878.88,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100711",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "high",
"timestamp": "2026-01-01T11:51:00Z",
"trace_id": "c27d990a-532d-3f9a-c403-5969d7a6da0d"
} | {
"account_age_days": 1920,
"account_id": "ACCT-819A724629CF",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_1",
"session_entropy": 0.452
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 540,
"timestamp": "2026-01-01T11:51:00Z",
"transaction_amount_usd": 19127.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.63,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 366725.78,
"financial_exposure_usd": 542396.07,
"recoverable_pct": 0.067
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108599",
"label": "benign",
"label_confidence": 0.533,
"severity": "low",
"timestamp": "2026-01-06T23:19:00Z",
"trace_id": "eebaef9b-2ef5-e52b-8d77-e7da108c37e0"
} | {
"account_age_days": 922,
"account_id": "ACCT-B05315FA1B6C",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_1",
"session_entropy": 0.755
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 875,
"timestamp": "2026-01-06T23:19:00Z",
"transaction_amount_usd": 5183.84
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.776,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 858.03,
"financial_exposure_usd": 994.37,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102728",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "critical",
"timestamp": "2026-01-02T21:28:00Z",
"trace_id": "c8bb8440-a1a1-caf3-afe4-e1b87f55fc1a"
} | {
"account_age_days": 15,
"account_id": "ACCT-91D8AE7F92F0",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_1",
"session_entropy": 0.575
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 749,
"timestamp": "2026-01-02T21:28:00Z",
"transaction_amount_usd": 47858.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.735,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 484523.05,
"financial_exposure_usd": 552977.37,
"recoverable_pct": 0.111
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104907",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "high",
"timestamp": "2026-01-04T09:47:00Z",
"trace_id": "8d18c18b-3bc2-daa3-5cc4-1eb70282485d"
} | {
"account_age_days": 1328,
"account_id": "ACCT-3896C7E1F5EB",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_2",
"session_entropy": 0.756
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 352,
"timestamp": "2026-01-04T09:47:00Z",
"transaction_amount_usd": 1786713.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.939,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1909766.13,
"financial_exposure_usd": 3855462.88,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102024",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-02T09:44:00Z",
"trace_id": "e77154fb-9760-fe2f-5b1b-c6427f92490b"
} | {
"account_age_days": 234,
"account_id": "ACCT-19782A3597F1",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_2",
"session_entropy": 0.803
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 294,
"timestamp": "2026-01-02T06:11:00Z",
"transaction_amount_usd": 1.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.731,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 572946.9,
"financial_exposure_usd": 1125441.57,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105338",
"label": "fraudulent",
"label_confidence": 0.665,
"severity": "critical",
"timestamp": "2026-01-04T16:58:00Z",
"trace_id": "4b6bf221-f8c8-5079-5774-928e69b0e2cb"
} | {
"account_age_days": 1612,
"account_id": "ACCT-F43DB06DA371",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_3",
"session_entropy": 0.881
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 290,
"timestamp": "2026-01-04T16:58:00Z",
"transaction_amount_usd": 481613.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.775,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 908177.79,
"financial_exposure_usd": 1330809.97,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100416",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-01T06:56:00Z",
"trace_id": "9e47cedc-d5ed-b0c8-618b-1b2ec83be551"
} | {
"account_age_days": 358,
"account_id": "ACCT-49BCBC580B3E",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_1",
"session_entropy": 0.57
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1096,
"timestamp": "2026-01-01T06:56:00Z",
"transaction_amount_usd": 114575.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.358,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 782835.75,
"financial_exposure_usd": 861851.1,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105654",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-04T22:14:00Z",
"trace_id": "8f2f3032-a88a-c051-a169-e33711b33082"
} | {
"account_age_days": 869,
"account_id": "ACCT-DD92FF88669A",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.47
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 436,
"timestamp": "2026-01-04T22:14:00Z",
"transaction_amount_usd": 527883.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.935,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1804010.36,
"financial_exposure_usd": 2895294.79,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103622",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-03T12:22:00Z",
"trace_id": "84dc353c-82f1-4a61-dff4-24b8d9e4232b"
} | {
"account_age_days": 1221,
"account_id": "ACCT-8DB432F16EA9",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_3",
"session_entropy": 0.809
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 134,
"timestamp": "2026-01-03T12:22:00Z",
"transaction_amount_usd": 844420.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.761,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4664617.42,
"financial_exposure_usd": 5011387.18,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109845",
"label": "benign",
"label_confidence": 0.626,
"severity": "low",
"timestamp": "2026-01-07T20:05:00Z",
"trace_id": "d4dc8efb-0477-49c8-185c-76fb95fe9863"
} | {
"account_age_days": 162,
"account_id": "ACCT-0A5364E33F59",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.677
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 205,
"timestamp": "2026-01-07T11:46:00Z",
"transaction_amount_usd": 21.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 961.14,
"financial_exposure_usd": 1477.27,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104145",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "high",
"timestamp": "2026-01-03T21:05:00Z",
"trace_id": "15765620-6cd0-6a46-721c-981f70de72af"
} | {
"account_age_days": 525,
"account_id": "ACCT-1EC2D66CE08E",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_2",
"session_entropy": 0.425
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 247,
"timestamp": "2026-01-03T12:19:00Z",
"transaction_amount_usd": 19.3
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.563,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1735098.92,
"financial_exposure_usd": 3763700.55,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107082",
"label": "benign",
"label_confidence": 0.685,
"severity": "medium",
"timestamp": "2026-01-05T22:02:00Z",
"trace_id": "a91b6a70-ef47-3644-74b0-13d07d44dcdc"
} | {
"account_age_days": 26,
"account_id": "ACCT-F4DC0C404919",
"baseline_risk_score": 0.167,
"kyc_tier": "tier_2",
"session_entropy": 0.813
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 221,
"timestamp": "2026-01-05T21:10:00Z",
"transaction_amount_usd": 12.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 324.3,
"financial_exposure_usd": 510.25,
"recoverable_pct": 0.718
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107788",
"label": "benign",
"label_confidence": 0.455,
"severity": "high",
"timestamp": "2026-01-06T09:48:00Z",
"trace_id": "2ad71a2f-4635-650a-d470-27b06b3aeb12"
} | {
"account_age_days": 1073,
"account_id": "ACCT-9DB8AF7C5A2E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.408
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 237,
"timestamp": "2026-01-06T09:48:00Z",
"transaction_amount_usd": 14115.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1771.63,
"financial_exposure_usd": 3522.67,
"recoverable_pct": 0.925
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102956",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-03T01:16:00Z",
"trace_id": "a5f19898-5f59-2557-f0cd-265890dfca00"
} | {
"account_age_days": 1309,
"account_id": "ACCT-23CD1D80CB87",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_3",
"session_entropy": 0.506
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 651,
"timestamp": "2026-01-03T01:16:00Z",
"transaction_amount_usd": 107856.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.435,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 188907.48,
"financial_exposure_usd": 300303.97,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108922",
"label": "benign",
"label_confidence": 0.646,
"severity": "high",
"timestamp": "2026-01-07T04:42:00Z",
"trace_id": "a559171d-4fa4-bdfe-5888-7415e47b5a2f"
} | {
"account_age_days": 1063,
"account_id": "ACCT-4D6A16ABE043",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.745
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 83,
"timestamp": "2026-01-06T21:23:00Z",
"transaction_amount_usd": 18.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.696,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100221",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "low",
"timestamp": "2026-01-01T03:41:00Z",
"trace_id": "90e65aa4-3d4a-49ae-e83f-6a2a52fc6f48"
} | {
"account_age_days": 1684,
"account_id": "ACCT-FDA8977AEF4B",
"baseline_risk_score": 0.575,
"kyc_tier": "tier_2",
"session_entropy": 0.568
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 650,
"timestamp": "2026-01-01T03:41:00Z",
"transaction_amount_usd": 37108.54
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.69,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 540208.29,
"financial_exposure_usd": 965656.55,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104636",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "critical",
"timestamp": "2026-01-04T05:16:00Z",
"trace_id": "0662a6ba-5e19-0b23-cf1d-6667d51391e8"
} | {
"account_age_days": 1881,
"account_id": "ACCT-07A1485AFD2C",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 770,
"timestamp": "2026-01-04T05:16:00Z",
"transaction_amount_usd": 2008242.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1439329.07,
"financial_exposure_usd": 2024567.45,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104864",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-04T09:04:00Z",
"trace_id": "b967afb6-ec8b-a1ff-aa13-091b06052a03"
} | {
"account_age_days": 1751,
"account_id": "ACCT-D9178A3DE47C",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_1",
"session_entropy": 0.448
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 210,
"timestamp": "2026-01-04T02:51:00Z",
"transaction_amount_usd": 23.85
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 796497.28,
"financial_exposure_usd": 1338479.26,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107628",
"label": "benign",
"label_confidence": 0.675,
"severity": "high",
"timestamp": "2026-01-06T07:08:00Z",
"trace_id": "4df1b00d-5136-487b-21a6-92f024f911a6"
} | {
"account_age_days": 141,
"account_id": "ACCT-1933D41CB6A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.192
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 203,
"timestamp": "2026-01-06T05:31:00Z",
"transaction_amount_usd": 12.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1236.13,
"financial_exposure_usd": 2450.97,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107746",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-06T09:06:00Z",
"trace_id": "721f1804-bde4-159b-7f65-d1ac17b36922"
} | {
"account_age_days": 1864,
"account_id": "ACCT-F85D3A3CD237",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.331
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 803,
"timestamp": "2026-01-06T09:06:00Z",
"transaction_amount_usd": 14667.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4009.72,
"financial_exposure_usd": 5921.09,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100195",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "high",
"timestamp": "2026-01-01T03:15:00Z",
"trace_id": "65c65e05-2ebf-af4c-8135-92e7f8c00141"
} | {
"account_age_days": 568,
"account_id": "ACCT-39EF20EA120E",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_1",
"session_entropy": 0.919
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 349,
"timestamp": "2025-12-31T18:11:00Z",
"transaction_amount_usd": 18.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 502358.04,
"financial_exposure_usd": 959616.68,
"recoverable_pct": 0.121
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100191",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "medium",
"timestamp": "2026-01-01T03:11:00Z",
"trace_id": "c461aac1-12b5-9aa4-c07d-000130de0010"
} | {
"account_age_days": 58,
"account_id": "ACCT-379CC41AEB7D",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.756
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 756,
"timestamp": "2026-01-01T03:11:00Z",
"transaction_amount_usd": 33585.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 365375.16,
"financial_exposure_usd": 879882.84,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100715",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-01T11:55:00Z",
"trace_id": "82bbf61b-00c7-890c-7e40-577802f668c6"
} | {
"account_age_days": 1842,
"account_id": "ACCT-FFD95216F233",
"baseline_risk_score": 0.547,
"kyc_tier": "tier_2",
"session_entropy": 0.506
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 814,
"timestamp": "2026-01-01T11:55:00Z",
"transaction_amount_usd": 30547.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.804,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 469591.83,
"financial_exposure_usd": 543059.29,
"recoverable_pct": 0.355
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101537",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-02T01:37:00Z",
"trace_id": "7513218c-1546-d4ef-681c-190937621a74"
} | {
"account_age_days": 1587,
"account_id": "ACCT-C2349D16C37E",
"baseline_risk_score": 0.469,
"kyc_tier": "tier_1",
"session_entropy": 0.675
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 490,
"timestamp": "2026-01-02T01:37:00Z",
"transaction_amount_usd": 98664.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.662,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 850346.3,
"financial_exposure_usd": 1168078.3,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105954",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-05T03:14:00Z",
"trace_id": "a9a032be-b439-64d5-9aab-12900f5611d5"
} | {
"account_age_days": 435,
"account_id": "ACCT-911C21438FE2",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.207
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 845,
"timestamp": "2026-01-05T03:14:00Z",
"transaction_amount_usd": 714591.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.611,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2437207.25,
"financial_exposure_usd": 3822210.71,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100194",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "critical",
"timestamp": "2026-01-01T03:14:00Z",
"trace_id": "fcd62aba-93c1-392f-8453-d8038519469e"
} | {
"account_age_days": 608,
"account_id": "ACCT-1ECA85B31C73",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.568
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 150,
"timestamp": "2026-01-01T03:14:00Z",
"transaction_amount_usd": 16239
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.534,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 462611.9,
"financial_exposure_usd": 632001.49,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109692",
"label": "benign",
"label_confidence": 0.615,
"severity": "low",
"timestamp": "2026-01-07T17:32:00Z",
"trace_id": "1e85f36c-56f3-1921-8d9f-4b9ebd4a94ec"
} | {
"account_age_days": 1012,
"account_id": "ACCT-142CCB3FB2CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1011,
"timestamp": "2026-01-07T17:32:00Z",
"transaction_amount_usd": 14245.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.524,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1393.34,
"financial_exposure_usd": 1787.61,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109179",
"label": "benign",
"label_confidence": 0.603,
"severity": "high",
"timestamp": "2026-01-07T08:59:00Z",
"trace_id": "0add7ae8-2065-7149-4c2d-4ce712954e0f"
} | {
"account_age_days": 609,
"account_id": "ACCT-EF10AF6E3867",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.542
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1078,
"timestamp": "2026-01-07T08:59:00Z",
"transaction_amount_usd": 6585.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1891.82,
"financial_exposure_usd": 4507.06,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105226",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "medium",
"timestamp": "2026-01-04T15:06:00Z",
"trace_id": "2d0c01ea-f28e-6015-0cc0-94ce45bbfe4a"
} | {
"account_age_days": 1567,
"account_id": "ACCT-E2C114E55048",
"baseline_risk_score": 0.181,
"kyc_tier": "tier_3",
"session_entropy": 0.88
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 99,
"timestamp": "2026-01-04T15:06:00Z",
"transaction_amount_usd": 861398.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.541,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2003816.68,
"financial_exposure_usd": 4745859.39,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105326",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "low",
"timestamp": "2026-01-04T16:46:00Z",
"trace_id": "066ce922-dcac-350b-b8b7-1c57f855a1d9"
} | {
"account_age_days": 1958,
"account_id": "ACCT-D5D5B6DBE75D",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_2",
"session_entropy": 0.107
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 692,
"timestamp": "2026-01-04T16:46:00Z",
"transaction_amount_usd": 1282935.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2663259.03,
"financial_exposure_usd": 4570322.58,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105408",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-04T18:08:00Z",
"trace_id": "eb3e33d8-3ae7-a9fc-270b-c9a7c81f07bb"
} | {
"account_age_days": 464,
"account_id": "ACCT-F9507758EE18",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 305,
"timestamp": "2026-01-04T14:54:00Z",
"transaction_amount_usd": 18.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.909,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5065107.62,
"financial_exposure_usd": 6033543.98,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108044",
"label": "benign",
"label_confidence": 0.621,
"severity": "high",
"timestamp": "2026-01-06T14:04:00Z",
"trace_id": "6d076e5e-be41-45aa-cfa8-e1a088f37189"
} | {
"account_age_days": 1458,
"account_id": "ACCT-52DB15832670",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_3",
"session_entropy": 0.208
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 435,
"timestamp": "2026-01-06T14:04:00Z",
"transaction_amount_usd": 10172.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2071.36,
"financial_exposure_usd": 3756.52,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108089",
"label": "benign",
"label_confidence": 0.707,
"severity": "low",
"timestamp": "2026-01-06T14:49:00Z",
"trace_id": "fdc9ec7e-611e-185b-1c39-285b3b449480"
} | {
"account_age_days": 309,
"account_id": "ACCT-87EB3DE5B6C4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 582,
"timestamp": "2026-01-06T14:49:00Z",
"transaction_amount_usd": 10599.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.642,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 521.29,
"financial_exposure_usd": 1003.65,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106181",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-05T07:01:00Z",
"trace_id": "b61b31ac-5962-8893-7f3f-98007a405fef"
} | {
"account_age_days": 892,
"account_id": "ACCT-47AA01A51D0B",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_2",
"session_entropy": 0.907
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 779,
"timestamp": "2026-01-05T07:01:00Z",
"transaction_amount_usd": 337543.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.822,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1126600.13,
"financial_exposure_usd": 1525737.47,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107964",
"label": "benign",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-06T12:44:00Z",
"trace_id": "de3725d6-bf7f-9ecf-ff06-b923fbad29d5"
} | {
"account_age_days": 1747,
"account_id": "ACCT-BB2B1EA45DC0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 844,
"timestamp": "2026-01-06T12:44:00Z",
"transaction_amount_usd": 754.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3305.71,
"financial_exposure_usd": 3912.73,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108873",
"label": "benign",
"label_confidence": 0.512,
"severity": "high",
"timestamp": "2026-01-07T03:53:00Z",
"trace_id": "153505fb-3a11-b8ef-c9a6-09cc05bab608"
} | {
"account_age_days": 1656,
"account_id": "ACCT-7D3391B0534A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.422
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1094,
"timestamp": "2026-01-07T03:53:00Z",
"transaction_amount_usd": 8684.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 613.57,
"financial_exposure_usd": 847.95,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103811",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-03T15:31:00Z",
"trace_id": "fcc2b129-7ed4-2b29-06f6-b1d22014f71b"
} | {
"account_age_days": 1545,
"account_id": "ACCT-D97D97123C55",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_2",
"session_entropy": 0.28
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 107,
"timestamp": "2026-01-03T15:31:00Z",
"transaction_amount_usd": 1230064.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.382,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4583402.17,
"financial_exposure_usd": 5305199.97,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105939",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-05T02:59:00Z",
"trace_id": "dba3c606-8f6c-88ee-5cb9-4a8c3ad2667d"
} | {
"account_age_days": 126,
"account_id": "ACCT-3B0A9BE04231",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_1",
"session_entropy": 0.615
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 951,
"timestamp": "2026-01-05T02:59:00Z",
"transaction_amount_usd": 2911102.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.463,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3240883.77,
"financial_exposure_usd": 5060358.96,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101031",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-01T17:11:00Z",
"trace_id": "091f323f-a93a-26d4-60f6-8115046ddac8"
} | {
"account_age_days": 953,
"account_id": "ACCT-08D0E66BCB86",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_1",
"session_entropy": 0.897
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 421,
"timestamp": "2026-01-01T17:11:00Z",
"transaction_amount_usd": 70114.17
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.899,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 480858.46,
"financial_exposure_usd": 540854.03,
"recoverable_pct": 0.394
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104840",
"label": "fraudulent",
"label_confidence": 0.64,
"severity": "high",
"timestamp": "2026-01-04T08:40:00Z",
"trace_id": "5a9e88d4-67fa-dad3-f336-f63832c5ea2a"
} | {
"account_age_days": 1360,
"account_id": "ACCT-3ACA660303EF",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_2",
"session_entropy": 0.644
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 433,
"timestamp": "2026-01-04T08:40:00Z",
"transaction_amount_usd": 2806610.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.621,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2030162.62,
"financial_exposure_usd": 5023874.27,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106373",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-05T10:13:00Z",
"trace_id": "78a1fcc4-c962-4319-a2db-8dbacdd488d4"
} | {
"account_age_days": 1781,
"account_id": "ACCT-4A499AD74C0E",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.759
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 606,
"timestamp": "2026-01-05T10:13:00Z",
"transaction_amount_usd": 1929448.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2122685.05,
"financial_exposure_usd": 2780848.48,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108666",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-07T00:26:00Z",
"trace_id": "afc70fda-b1a2-b29f-7fe2-e6806b8f346c"
} | {
"account_age_days": 106,
"account_id": "ACCT-EAD433542D58",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_3",
"session_entropy": 0.596
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 301,
"timestamp": "2026-01-06T16:32:00Z",
"transaction_amount_usd": 10.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 581.48,
"financial_exposure_usd": 1271.88,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103503",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "low",
"timestamp": "2026-01-03T10:23:00Z",
"trace_id": "4c91f63c-f70c-33d7-7ad9-3939be2abc90"
} | {
"account_age_days": 1933,
"account_id": "ACCT-479DF2ED84B9",
"baseline_risk_score": 0.223,
"kyc_tier": "tier_3",
"session_entropy": 0.509
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1168,
"timestamp": "2026-01-03T10:23:00Z",
"transaction_amount_usd": 923849.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.38,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2805266.48,
"financial_exposure_usd": 3351392.17,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106755",
"label": "benign",
"label_confidence": 0.646,
"severity": "high",
"timestamp": "2026-01-05T16:35:00Z",
"trace_id": "0cf1c211-3f49-208e-6823-277a6f3b57cd"
} | {
"account_age_days": 1092,
"account_id": "ACCT-FF2A89754A6C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.191
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 320,
"timestamp": "2026-01-05T16:35:00Z",
"transaction_amount_usd": 8015.8
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2764.78,
"financial_exposure_usd": 4439.65,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107606",
"label": "benign",
"label_confidence": 0.672,
"severity": "high",
"timestamp": "2026-01-06T06:46:00Z",
"trace_id": "6fb3a895-bd59-8fb0-94c6-4155e4d3bf84"
} | {
"account_age_days": 1298,
"account_id": "ACCT-D1865BB3E683",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 128,
"timestamp": "2026-01-05T20:31:00Z",
"transaction_amount_usd": 15.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1549.3,
"financial_exposure_usd": 2816.3,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103422",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "high",
"timestamp": "2026-01-03T09:02:00Z",
"trace_id": "f66e6a64-84c5-107e-01b2-ff51b452c391"
} | {
"account_age_days": 966,
"account_id": "ACCT-87D10CD69F77",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_2",
"session_entropy": 0.75
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 532,
"timestamp": "2026-01-03T09:02:00Z",
"transaction_amount_usd": 1616571.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.636,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2595514.07,
"financial_exposure_usd": 4841153.32,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102764",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "high",
"timestamp": "2026-01-02T22:04:00Z",
"trace_id": "2e26e805-2dea-0cc8-91d8-0d8248ef6696"
} | {
"account_age_days": 1781,
"account_id": "ACCT-3FF0CFA45560",
"baseline_risk_score": 0.536,
"kyc_tier": "tier_3",
"session_entropy": 0.514
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 128,
"timestamp": "2026-01-02T11:11:00Z",
"transaction_amount_usd": 15.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.389,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 391201.57,
"financial_exposure_usd": 812871.99,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106879",
"label": "benign",
"label_confidence": 0.461,
"severity": "low",
"timestamp": "2026-01-05T18:39:00Z",
"trace_id": "7af7af64-f6d8-bd8b-7191-3ff0511b455d"
} | {
"account_age_days": 643,
"account_id": "ACCT-F97F386B8700",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.527
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 631,
"timestamp": "2026-01-05T18:39:00Z",
"transaction_amount_usd": 7871.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2680.1,
"financial_exposure_usd": 3817.99,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107744",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-06T09:04:00Z",
"trace_id": "45ef8c23-ce2a-c2f4-a27a-5423b3ea8ab4"
} | {
"account_age_days": 420,
"account_id": "ACCT-6610FA61142D",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_2",
"session_entropy": 0.618
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 389,
"timestamp": "2026-01-06T04:17:00Z",
"transaction_amount_usd": 5.04
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.751,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2065.52,
"financial_exposure_usd": 3064.89,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100269",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "high",
"timestamp": "2026-01-01T04:29:00Z",
"trace_id": "47eb1172-2d47-d84c-143d-9bff1a89383c"
} | {
"account_age_days": 1387,
"account_id": "ACCT-44B2E5AAF334",
"baseline_risk_score": 0.601,
"kyc_tier": "tier_2",
"session_entropy": 0.14
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 83,
"timestamp": "2026-01-01T02:11:00Z",
"transaction_amount_usd": 15.99
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.533,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 619403.1,
"financial_exposure_usd": 1084533.16,
"recoverable_pct": 0.397
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108982",
"label": "benign",
"label_confidence": 0.474,
"severity": "low",
"timestamp": "2026-01-07T05:42:00Z",
"trace_id": "7c4f8379-d65f-ee92-83aa-534ba64bd840"
} | {
"account_age_days": 626,
"account_id": "ACCT-D6D6BF1F3404",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.299
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 236,
"timestamp": "2026-01-06T17:57:00Z",
"transaction_amount_usd": 4.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1121.9,
"financial_exposure_usd": 2081.11,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108156",
"label": "benign",
"label_confidence": 0.61,
"severity": "high",
"timestamp": "2026-01-06T15:56:00Z",
"trace_id": "10842513-ef87-680f-de38-f5fdfad42f1c"
} | {
"account_age_days": 1842,
"account_id": "ACCT-CAEBD46A0F73",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_3",
"session_entropy": 0.274
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 389,
"timestamp": "2026-01-06T10:07:00Z",
"transaction_amount_usd": 17.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.49,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 222.47,
"financial_exposure_usd": 289.18,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107737",
"label": "benign",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-06T08:57:00Z",
"trace_id": "279ffb62-62ac-a5de-e4c7-bf08cf4b3ad0"
} | {
"account_age_days": 1697,
"account_id": "ACCT-F76701563C29",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_1",
"session_entropy": 0.317
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 831,
"timestamp": "2026-01-06T08:57:00Z",
"transaction_amount_usd": 12944.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3626.97,
"financial_exposure_usd": 5014.54,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106794",
"label": "benign",
"label_confidence": 0.509,
"severity": "low",
"timestamp": "2026-01-05T17:14:00Z",
"trace_id": "7f72d579-74a9-cfb4-86aa-690cc3b6751a"
} | {
"account_age_days": 959,
"account_id": "ACCT-AAE5C9C95625",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_1",
"session_entropy": 0.58
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 307,
"timestamp": "2026-01-05T17:14:00Z",
"transaction_amount_usd": 3155.16
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1732.59,
"financial_exposure_usd": 2567.85,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108578",
"label": "benign",
"label_confidence": 0.733,
"severity": "critical",
"timestamp": "2026-01-06T22:58:00Z",
"trace_id": "836c0f8a-45af-6447-874e-bfc3367512f0"
} | {
"account_age_days": 1471,
"account_id": "ACCT-0362D010D384",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_2",
"session_entropy": 0.76
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 352,
"timestamp": "2026-01-06T22:58:00Z",
"transaction_amount_usd": 1852.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.469,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2634.68,
"financial_exposure_usd": 3386.62,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103575",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "low",
"timestamp": "2026-01-03T11:35:00Z",
"trace_id": "33793ab0-2049-1f7f-b332-8825e51f7cf6"
} | {
"account_age_days": 1586,
"account_id": "ACCT-FBAB2850A515",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_1",
"session_entropy": 0.946
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 314,
"timestamp": "2026-01-03T11:35:00Z",
"transaction_amount_usd": 657237.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.405,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5877354.65,
"financial_exposure_usd": 8605104.25,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100077",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-01T01:17:00Z",
"trace_id": "5d822e3a-6c6d-282b-69e0-8370abf7a5d0"
} | {
"account_age_days": 1456,
"account_id": "ACCT-FAD3B44C3B2D",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_1",
"session_entropy": 0.424
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 259,
"timestamp": "2025-12-31T18:49:00Z",
"transaction_amount_usd": 19.24
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.641,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 459135.37,
"financial_exposure_usd": 897010.8,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101617",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-02T02:57:00Z",
"trace_id": "62d15777-927c-41d4-3adc-35e802552a92"
} | {
"account_age_days": 675,
"account_id": "ACCT-747291D692C9",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_1",
"session_entropy": 0.366
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 117,
"timestamp": "2026-01-02T02:57:00Z",
"transaction_amount_usd": 116345.99
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.52,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1011783.89,
"financial_exposure_usd": 1090571.22,
"recoverable_pct": 0.107
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100163",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "medium",
"timestamp": "2026-01-01T02:43:00Z",
"trace_id": "e9368ad0-f52e-af63-badf-c7a8aeaf3951"
} | {
"account_age_days": 1554,
"account_id": "ACCT-BBDF144CD117",
"baseline_risk_score": 0.605,
"kyc_tier": "tier_3",
"session_entropy": 0.38
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 801,
"timestamp": "2026-01-01T02:43:00Z",
"transaction_amount_usd": 23221.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.491,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1033918.83,
"financial_exposure_usd": 1170389.47,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106272",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "medium",
"timestamp": "2026-01-05T08:32:00Z",
"trace_id": "9eed65c5-d995-60df-1ff1-6efac8001e49"
} | {
"account_age_days": 1748,
"account_id": "ACCT-BFFF175F10FC",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_1",
"session_entropy": 0.186
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 737,
"timestamp": "2026-01-05T08:32:00Z",
"transaction_amount_usd": 744291.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.916,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2195739.76,
"financial_exposure_usd": 3214827.82,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103598",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-03T11:58:00Z",
"trace_id": "c0454187-41a2-65a3-450b-868fe69db6c9"
} | {
"account_age_days": 457,
"account_id": "ACCT-044146EB0980",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.137
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1086,
"timestamp": "2026-01-03T11:58:00Z",
"transaction_amount_usd": 1444937.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.94,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6124362.18,
"financial_exposure_usd": 6422705.59,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105577",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-04T20:57:00Z",
"trace_id": "4cab9f63-0f1d-8895-3589-855091652785"
} | {
"account_age_days": 95,
"account_id": "ACCT-A43BA67C39C1",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_1",
"session_entropy": 0.176
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1102,
"timestamp": "2026-01-04T20:57:00Z",
"transaction_amount_usd": 2658899.57
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.546,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2247046.95,
"financial_exposure_usd": 2607374.36,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106176",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-05T06:56:00Z",
"trace_id": "a32a96e9-7bf3-8e2e-b7ea-916f1822ed88"
} | {
"account_age_days": 1044,
"account_id": "ACCT-15D1000F9243",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_3",
"session_entropy": 0.146
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 356,
"timestamp": "2026-01-05T00:37:00Z",
"transaction_amount_usd": 8.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.789,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3311600.79,
"financial_exposure_usd": 6383740.11,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102119",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-02T11:19:00Z",
"trace_id": "33171c00-b669-2011-5f4f-57c6b11de190"
} | {
"account_age_days": 176,
"account_id": "ACCT-F15B2E38826E",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_1",
"session_entropy": 0.189
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1131,
"timestamp": "2026-01-02T11:19:00Z",
"transaction_amount_usd": 112423.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.595,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 296283.08,
"financial_exposure_usd": 601600.46,
"recoverable_pct": 0.255
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103116",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "high",
"timestamp": "2026-01-03T03:56:00Z",
"trace_id": "90f236a6-204d-261d-c206-5e9f9c14de09"
} | {
"account_age_days": 270,
"account_id": "ACCT-E272E5C0ADBD",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_3",
"session_entropy": 0.527
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 572,
"timestamp": "2026-01-03T03:56:00Z",
"transaction_amount_usd": 47879.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 669330.4,
"financial_exposure_usd": 1140964.89,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100874",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-01T14:34:00Z",
"trace_id": "52ac3c4d-c3c4-1672-8244-bfa3fe7e68af"
} | {
"account_age_days": 83,
"account_id": "ACCT-B698CD27EEAA",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_2",
"session_entropy": 0.887
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 892,
"timestamp": "2026-01-01T14:34:00Z",
"transaction_amount_usd": 34578.43
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.731,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 869882.12,
"financial_exposure_usd": 948360.63,
"recoverable_pct": 0.203
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109290",
"label": "benign",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-07T10:50:00Z",
"trace_id": "714263ac-bd91-3e0b-4065-e49da4c385dc"
} | {
"account_age_days": 21,
"account_id": "ACCT-ACB6AC67023D",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.624
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 932,
"timestamp": "2026-01-07T10:50:00Z",
"transaction_amount_usd": 10302.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3189.83,
"financial_exposure_usd": 3974.54,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105219",
"label": "fraudulent",
"label_confidence": 0.878,
"severity": "high",
"timestamp": "2026-01-04T14:59:00Z",
"trace_id": "71641cdd-0bc0-ad8d-bf47-3ecff1870494"
} | {
"account_age_days": 929,
"account_id": "ACCT-AD4F68805B94",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_1",
"session_entropy": 0.308
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 367,
"timestamp": "2026-01-04T12:49:00Z",
"transaction_amount_usd": 18.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.662,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1961777.98,
"financial_exposure_usd": 2271488.78,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104500",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "high",
"timestamp": "2026-01-04T03:00:00Z",
"trace_id": "faea23db-2440-67e6-a6fe-38a123b3c73c"
} | {
"account_age_days": 1698,
"account_id": "ACCT-F89888844AB9",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_3",
"session_entropy": 0.117
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 390,
"timestamp": "2026-01-04T03:00:00Z",
"transaction_amount_usd": 1740983.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.923,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5933497.56,
"financial_exposure_usd": 6363188.07,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108502",
"label": "benign",
"label_confidence": 0.506,
"severity": "low",
"timestamp": "2026-01-06T21:42:00Z",
"trace_id": "e37e24ff-06a0-49af-1fbc-ad75fa07877d"
} | {
"account_age_days": 1519,
"account_id": "ACCT-E456E59FB291",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_1",
"session_entropy": 0.567
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 91,
"timestamp": "2026-01-06T14:54:00Z",
"transaction_amount_usd": 0.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 864.26,
"financial_exposure_usd": 1190.8,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104716",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "critical",
"timestamp": "2026-01-04T06:36:00Z",
"trace_id": "92e6aeb4-74df-ecb1-1946-24d4e6dc6307"
} | {
"account_age_days": 1303,
"account_id": "ACCT-78E36FA95953",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.244
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 216,
"timestamp": "2026-01-03T23:22:00Z",
"transaction_amount_usd": 16.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.881,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1655148.85,
"financial_exposure_usd": 2324816.98,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109478",
"label": "benign",
"label_confidence": 0.637,
"severity": "low",
"timestamp": "2026-01-07T13:58:00Z",
"trace_id": "0a88fb57-1a32-0e90-30a6-354f87fce1bb"
} | {
"account_age_days": 591,
"account_id": "ACCT-69FFB0B61062",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 979,
"timestamp": "2026-01-07T13:58:00Z",
"transaction_amount_usd": 6515.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.619,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 962.05,
"financial_exposure_usd": 2329.55,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108536",
"label": "benign",
"label_confidence": 0.481,
"severity": "medium",
"timestamp": "2026-01-06T22:16:00Z",
"trace_id": "9ea152eb-4cb6-27cf-b76a-b0c8c0fadb74"
} | {
"account_age_days": 1332,
"account_id": "ACCT-65C0677D4727",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.828
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 224,
"timestamp": "2026-01-06T22:16:00Z",
"transaction_amount_usd": 12307.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 382.77,
"financial_exposure_usd": 539.71,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107630",
"label": "benign",
"label_confidence": 0.607,
"severity": "critical",
"timestamp": "2026-01-06T07:10:00Z",
"trace_id": "f7260a19-8b92-259b-5f71-80f5f8c2d980"
} | {
"account_age_days": 1559,
"account_id": "ACCT-875CB8424973",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_1",
"session_entropy": 0.831
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 127,
"timestamp": "2026-01-06T07:10:00Z",
"transaction_amount_usd": 3291.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3907.88,
"financial_exposure_usd": 4134.58,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109897",
"label": "benign",
"label_confidence": 0.46,
"severity": "medium",
"timestamp": "2026-01-07T20:57:00Z",
"trace_id": "20432258-4d9b-1e6d-7acf-c64793bfc753"
} | {
"account_age_days": 313,
"account_id": "ACCT-0AEE9921F0C0",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.469
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 891,
"timestamp": "2026-01-07T20:57:00Z",
"transaction_amount_usd": 11743.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4953.64,
"financial_exposure_usd": 7337.67,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103219",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "critical",
"timestamp": "2026-01-03T05:39:00Z",
"trace_id": "4d07933f-6492-0339-373d-cc4dabb66106"
} | {
"account_age_days": 93,
"account_id": "ACCT-3993C6A06607",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_1",
"session_entropy": 0.4
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 562,
"timestamp": "2026-01-03T05:39:00Z",
"transaction_amount_usd": 16230.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.839,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 671054.05,
"financial_exposure_usd": 778067.09,
"recoverable_pct": 0.114
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101108",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "medium",
"timestamp": "2026-01-01T18:28:00Z",
"trace_id": "f052333a-afc4-2a10-632c-96e94f92c29e"
} | {
"account_age_days": 448,
"account_id": "ACCT-ED8ED27B04A1",
"baseline_risk_score": 0.457,
"kyc_tier": "tier_2",
"session_entropy": 0.468
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 386,
"timestamp": "2026-01-01T11:53:00Z",
"transaction_amount_usd": 17.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.853,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 794088.76,
"financial_exposure_usd": 818290.22,
"recoverable_pct": 0.13
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105692",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "high",
"timestamp": "2026-01-04T22:52:00Z",
"trace_id": "a81b4537-0755-5126-5ba9-4940711baa05"
} | {
"account_age_days": 573,
"account_id": "ACCT-05184A60C47F",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_1",
"session_entropy": 0.638
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 232,
"timestamp": "2026-01-04T17:22:00Z",
"transaction_amount_usd": 22.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.56,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1671737.35,
"financial_exposure_usd": 2721591.11,
"recoverable_pct": 0.472
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101391",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "critical",
"timestamp": "2026-01-01T23:11:00Z",
"trace_id": "e6f79fe1-754c-573d-72d6-3c3412256807"
} | {
"account_age_days": 528,
"account_id": "ACCT-28CE892E3B3B",
"baseline_risk_score": 0.475,
"kyc_tier": "tier_1",
"session_entropy": 0.563
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 323,
"timestamp": "2026-01-01T23:11:00Z",
"transaction_amount_usd": 99870.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 260418.57,
"financial_exposure_usd": 401449.08,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104039",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "high",
"timestamp": "2026-01-03T19:19:00Z",
"trace_id": "a65c2572-9248-8c3b-14fe-39c6b29844f7"
} | {
"account_age_days": 521,
"account_id": "ACCT-ADA87CCB3767",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_1",
"session_entropy": 0.188
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 312,
"timestamp": "2026-01-03T16:21:00Z",
"transaction_amount_usd": 13.26
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.739,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1608899.31,
"financial_exposure_usd": 3984343.29,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101200",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-01T20:00:00Z",
"trace_id": "b323fa5b-8fc8-c473-dc1f-d5d05b35b263"
} | {
"account_age_days": 137,
"account_id": "ACCT-AF70988F8609",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_2",
"session_entropy": 0.374
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 316,
"timestamp": "2026-01-01T20:00:00Z",
"transaction_amount_usd": 112238.46
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.721,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 358633.63,
"financial_exposure_usd": 573070.14,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108944",
"label": "benign",
"label_confidence": 0.462,
"severity": "high",
"timestamp": "2026-01-07T05:04:00Z",
"trace_id": "28be03dc-2d63-4a89-04d9-b87841f5fc0a"
} | {
"account_age_days": 536,
"account_id": "ACCT-7E384E346F0A",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_2",
"session_entropy": 0.799
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1060,
"timestamp": "2026-01-07T05:04:00Z",
"transaction_amount_usd": 5311.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.58,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1000.62,
"financial_exposure_usd": 2030.25,
"recoverable_pct": 0.417
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108585",
"label": "benign",
"label_confidence": 0.632,
"severity": "low",
"timestamp": "2026-01-06T23:05:00Z",
"trace_id": "4fd985e9-c13e-5b51-6738-f445ee305998"
} | {
"account_age_days": 740,
"account_id": "ACCT-148A86B90379",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.133
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 253,
"timestamp": "2026-01-06T23:05:00Z",
"transaction_amount_usd": 1829.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 644.32,
"financial_exposure_usd": 1516.62,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102281",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-02T14:01:00Z",
"trace_id": "904931ce-f5e6-01fd-475a-af01b981c8e1"
} | {
"account_age_days": 302,
"account_id": "ACCT-368A02BBB9DA",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_3",
"session_entropy": 0.833
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 204,
"timestamp": "2026-01-02T14:01:00Z",
"transaction_amount_usd": 114994.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.524,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 738108.27,
"financial_exposure_usd": 807716.98,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101845",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "critical",
"timestamp": "2026-01-02T06:45:00Z",
"trace_id": "cce72fc4-7e11-d979-d5d6-09a495e72a77"
} | {
"account_age_days": 402,
"account_id": "ACCT-63E95074BA67",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_1",
"session_entropy": 0.396
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1060,
"timestamp": "2026-01-02T06:45:00Z",
"transaction_amount_usd": 26604.12
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.89,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 834513.69,
"financial_exposure_usd": 1101844.93,
"recoverable_pct": 0.016
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103599",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "medium",
"timestamp": "2026-01-03T11:59:00Z",
"trace_id": "9203eb31-1547-97a5-3b86-98002f23654f"
} | {
"account_age_days": 1048,
"account_id": "ACCT-EBFC16EFD4FE",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_1",
"session_entropy": 0.494
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1193,
"timestamp": "2026-01-03T11:59:00Z",
"transaction_amount_usd": 1657983.48
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.786,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1824888.17,
"financial_exposure_usd": 2498082.77,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107057",
"label": "benign",
"label_confidence": 0.561,
"severity": "medium",
"timestamp": "2026-01-05T21:37:00Z",
"trace_id": "7786c9c6-2488-7e61-8b68-1bfebcf4788e"
} | {
"account_age_days": 1737,
"account_id": "ACCT-8F514C7B9922",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.58
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 210,
"timestamp": "2026-01-05T21:37:00Z",
"transaction_amount_usd": 6947.95
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.502,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1617.88,
"financial_exposure_usd": 2565.3,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104469",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-04T02:29:00Z",
"trace_id": "87e505cf-44ad-4601-68bb-62aa08c2e7e4"
} | {
"account_age_days": 488,
"account_id": "ACCT-9820590830B5",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_1",
"session_entropy": 0.288
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 962,
"timestamp": "2026-01-04T02:29:00Z",
"transaction_amount_usd": 998729.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.834,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2679154.31,
"financial_exposure_usd": 3059978.59,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106249",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-05T08:09:00Z",
"trace_id": "b99aa0da-2f44-e3ce-6179-f6886c0bb8b2"
} | {
"account_age_days": 1019,
"account_id": "ACCT-40AB8145581A",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_1",
"session_entropy": 0.584
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 100,
"timestamp": "2026-01-05T04:32:00Z",
"transaction_amount_usd": 6.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.698,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3127404.49,
"financial_exposure_usd": 6831758.34,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.