schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107035",
"label": "benign",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-05T21:15:00Z",
"trace_id": "59d4317b-24e4-3ba5-0c07-1c8fb4df3b8c"
} | {
"account_age_days": 1905,
"account_id": "ACCT-128C53121493",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.395
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 98,
"timestamp": "2026-01-05T21:15:00Z",
"transaction_amount_usd": 10816.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 784.76,
"financial_exposure_usd": 1285.71,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102043",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "critical",
"timestamp": "2026-01-02T10:03:00Z",
"trace_id": "ddb90601-afcd-cbb5-9207-b5ebd1a8a32d"
} | {
"account_age_days": 966,
"account_id": "ACCT-0D27630AC583",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_2",
"session_entropy": 0.245
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 822,
"timestamp": "2026-01-02T10:03:00Z",
"transaction_amount_usd": 76629.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.502,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 411723.73,
"financial_exposure_usd": 839907.42,
"recoverable_pct": 0.36
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103688",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "critical",
"timestamp": "2026-01-03T13:28:00Z",
"trace_id": "8a769990-7b2a-a0f6-9f84-853cd5e5edc7"
} | {
"account_age_days": 213,
"account_id": "ACCT-842617AC4AEA",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_2",
"session_entropy": 0.827
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1014,
"timestamp": "2026-01-03T13:28:00Z",
"transaction_amount_usd": 472899.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6141121.03,
"financial_exposure_usd": 8000908.12,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100035",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "low",
"timestamp": "2026-01-01T00:35:00Z",
"trace_id": "409e7a80-86c5-d1d6-9ea9-f50831227592"
} | {
"account_age_days": 815,
"account_id": "ACCT-9D264599C4DD",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.912
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 204,
"timestamp": "2025-12-31T17:28:00Z",
"transaction_amount_usd": 10.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.73,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 237251.28,
"financial_exposure_usd": 341682.37,
"recoverable_pct": 0.302
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103920",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "low",
"timestamp": "2026-01-03T17:20:00Z",
"trace_id": "afb1ab8a-f495-4cda-d2f0-1c98f008cb3d"
} | {
"account_age_days": 1255,
"account_id": "ACCT-BE1FB2D9AE4A",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_1",
"session_entropy": 0.812
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 173,
"timestamp": "2026-01-03T09:49:00Z",
"transaction_amount_usd": 5.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.642,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2787905.97,
"financial_exposure_usd": 5347074.46,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100118",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "low",
"timestamp": "2026-01-01T01:58:00Z",
"trace_id": "57b6f1aa-f206-4a1c-ae9e-2bbfe2495790"
} | {
"account_age_days": 352,
"account_id": "ACCT-91B0AF074700",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_3",
"session_entropy": 0.525
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 187,
"timestamp": "2025-12-31T14:15:00Z",
"transaction_amount_usd": 24.58
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.746,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 178816.1,
"financial_exposure_usd": 407125.3,
"recoverable_pct": 0.109
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106565",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "low",
"timestamp": "2026-01-05T13:25:00Z",
"trace_id": "c66308b2-acb9-2b6b-5d92-921068cb28eb"
} | {
"account_age_days": 71,
"account_id": "ACCT-6259479AD46B",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_2",
"session_entropy": 0.814
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 121,
"timestamp": "2026-01-05T03:06:00Z",
"transaction_amount_usd": 18.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3701326.75,
"financial_exposure_usd": 5203086.8,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100679",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "high",
"timestamp": "2026-01-01T11:19:00Z",
"trace_id": "7f1cb660-63d2-f7d6-d8e4-7208d5258d42"
} | {
"account_age_days": 1929,
"account_id": "ACCT-0AF55A81E6DA",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_2",
"session_entropy": 0.156
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 380,
"timestamp": "2025-12-31T23:44:00Z",
"transaction_amount_usd": 4.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.619,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 515453.95,
"financial_exposure_usd": 871279.25,
"recoverable_pct": 0.256
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109630",
"label": "benign",
"label_confidence": 0.592,
"severity": "medium",
"timestamp": "2026-01-07T16:30:00Z",
"trace_id": "375fadaa-79a7-6862-7840-8fcbe7c5fd41"
} | {
"account_age_days": 758,
"account_id": "ACCT-88566ED49206",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.562
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 249,
"timestamp": "2026-01-07T09:13:00Z",
"transaction_amount_usd": 5.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2580.84,
"financial_exposure_usd": 2784.2,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106666",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "high",
"timestamp": "2026-01-05T15:06:00Z",
"trace_id": "08556cc4-ebaf-fc68-76a5-0e7936df687f"
} | {
"account_age_days": 602,
"account_id": "ACCT-F28011F5737B",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_2",
"session_entropy": 0.383
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 312,
"timestamp": "2026-01-05T15:06:00Z",
"transaction_amount_usd": 1229626.07
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2845437.28,
"financial_exposure_usd": 5574067.63,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102942",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-03T01:02:00Z",
"trace_id": "38a08d59-8929-784e-dc34-0d675d0126fc"
} | {
"account_age_days": 500,
"account_id": "ACCT-F3C4966C9FB6",
"baseline_risk_score": 0.472,
"kyc_tier": "tier_1",
"session_entropy": 0.189
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1057,
"timestamp": "2026-01-03T01:02:00Z",
"transaction_amount_usd": 77661.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 467716.3,
"financial_exposure_usd": 491081.15,
"recoverable_pct": 0.238
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106031",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "low",
"timestamp": "2026-01-05T04:31:00Z",
"trace_id": "7d28b16b-297f-6466-f4f1-457af1f3b046"
} | {
"account_age_days": 303,
"account_id": "ACCT-B3990FAE8E8A",
"baseline_risk_score": 0.221,
"kyc_tier": "tier_2",
"session_entropy": 0.563
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 914,
"timestamp": "2026-01-05T04:31:00Z",
"transaction_amount_usd": 1490424.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.943,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1899888.61,
"financial_exposure_usd": 2650103.26,
"recoverable_pct": 0.911
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101771",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "medium",
"timestamp": "2026-01-02T05:31:00Z",
"trace_id": "ad5e4c26-72d1-f23d-8d30-952314373c4d"
} | {
"account_age_days": 1940,
"account_id": "ACCT-08614A653846",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_3",
"session_entropy": 0.866
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 346,
"timestamp": "2026-01-02T05:31:00Z",
"transaction_amount_usd": 96313.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.577,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 825951.37,
"financial_exposure_usd": 905065.43,
"recoverable_pct": 0.156
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100775",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "critical",
"timestamp": "2026-01-01T12:55:00Z",
"trace_id": "e9992f48-754f-c6a3-9b6c-5640d11c8c88"
} | {
"account_age_days": 1001,
"account_id": "ACCT-74558D8634C5",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_3",
"session_entropy": 0.816
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 786,
"timestamp": "2026-01-01T12:55:00Z",
"transaction_amount_usd": 70957.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 372342.24,
"financial_exposure_usd": 752402.82,
"recoverable_pct": 0.308
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106641",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-05T14:41:00Z",
"trace_id": "036c75ed-3896-6073-6219-e7bd240470f5"
} | {
"account_age_days": 605,
"account_id": "ACCT-2A2AD13B1DA0",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_2",
"session_entropy": 0.341
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 313,
"timestamp": "2026-01-05T12:19:00Z",
"transaction_amount_usd": 3.12
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.761,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4461784.7,
"financial_exposure_usd": 4818921.32,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105358",
"label": "fraudulent",
"label_confidence": 0.721,
"severity": "medium",
"timestamp": "2026-01-04T17:18:00Z",
"trace_id": "754ff933-4af7-028f-14ab-d99be8b1e119"
} | {
"account_age_days": 1103,
"account_id": "ACCT-6471FF2EB5A0",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_1",
"session_entropy": 0.872
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 274,
"timestamp": "2026-01-04T17:18:00Z",
"transaction_amount_usd": 1322893.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2321217.73,
"financial_exposure_usd": 3696606.68,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101844",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "critical",
"timestamp": "2026-01-02T06:44:00Z",
"trace_id": "20322caa-9d9f-db05-3bf2-0128cef16284"
} | {
"account_age_days": 337,
"account_id": "ACCT-EA7EB287CD33",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_2",
"session_entropy": 0.485
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 353,
"timestamp": "2026-01-01T22:46:00Z",
"transaction_amount_usd": 6.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.93,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 733751.46,
"financial_exposure_usd": 853437.44,
"recoverable_pct": 0.346
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108604",
"label": "benign",
"label_confidence": 0.718,
"severity": "medium",
"timestamp": "2026-01-06T23:24:00Z",
"trace_id": "d19f5a69-d2fa-e775-af55-ede99ac505f2"
} | {
"account_age_days": 981,
"account_id": "ACCT-1495DC8E1B9D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.264
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 711,
"timestamp": "2026-01-06T23:24:00Z",
"transaction_amount_usd": 8437.07
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4369.37,
"financial_exposure_usd": 4864.39,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106297",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "medium",
"timestamp": "2026-01-05T08:57:00Z",
"trace_id": "7b8dd581-a5b1-ef67-80ee-e2b96f396df2"
} | {
"account_age_days": 984,
"account_id": "ACCT-7B11DA540260",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.416
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 385,
"timestamp": "2026-01-04T21:57:00Z",
"transaction_amount_usd": 13.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.73,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5391621.77,
"financial_exposure_usd": 5594474.24,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105356",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "medium",
"timestamp": "2026-01-04T17:16:00Z",
"trace_id": "ae2f5996-f809-4684-6325-baaaeac05977"
} | {
"account_age_days": 1993,
"account_id": "ACCT-1B05A2306CE3",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_3",
"session_entropy": 0.913
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 870,
"timestamp": "2026-01-04T17:16:00Z",
"transaction_amount_usd": 2526455.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2308636.15,
"financial_exposure_usd": 3915628.96,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107501",
"label": "benign",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-06T05:01:00Z",
"trace_id": "11d76456-ec1e-57f8-c053-8ce69a7a9ff5"
} | {
"account_age_days": 1319,
"account_id": "ACCT-F61CE9B27204",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.751
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 803,
"timestamp": "2026-01-06T05:01:00Z",
"transaction_amount_usd": 14299.32
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 427.94,
"financial_exposure_usd": 784.37,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108457",
"label": "benign",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-06T20:57:00Z",
"trace_id": "f14a3584-7254-cf33-f97e-d660729b9113"
} | {
"account_age_days": 1420,
"account_id": "ACCT-BF26CF5D8194",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.104
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 964,
"timestamp": "2026-01-06T20:57:00Z",
"transaction_amount_usd": 1643.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 4417.35,
"financial_exposure_usd": 4425.42,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102017",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-02T09:37:00Z",
"trace_id": "0cfb9187-ab0f-dbca-080e-0bd749a973f5"
} | {
"account_age_days": 1189,
"account_id": "ACCT-DF34B3C54DBD",
"baseline_risk_score": 0.574,
"kyc_tier": "tier_3",
"session_entropy": 0.39
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 323,
"timestamp": "2026-01-02T04:45:00Z",
"transaction_amount_usd": 1.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.734,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 491617.3,
"financial_exposure_usd": 800092.54,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109121",
"label": "benign",
"label_confidence": 0.595,
"severity": "medium",
"timestamp": "2026-01-07T08:01:00Z",
"trace_id": "a436ce6f-ed54-baf8-9c2f-5d0106049b3e"
} | {
"account_age_days": 1697,
"account_id": "ACCT-7CB0738AE8E7",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_3",
"session_entropy": 0.338
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 366,
"timestamp": "2026-01-07T03:41:00Z",
"transaction_amount_usd": 12.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1275.87,
"financial_exposure_usd": 2995.64,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107605",
"label": "benign",
"label_confidence": 0.619,
"severity": "critical",
"timestamp": "2026-01-06T06:45:00Z",
"trace_id": "04885c14-9f58-9284-e82a-79137e1cea62"
} | {
"account_age_days": 359,
"account_id": "ACCT-6EE4086E3BA8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.137
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1119,
"timestamp": "2026-01-06T06:45:00Z",
"transaction_amount_usd": 10286.08
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1151.76,
"financial_exposure_usd": 2428.36,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105466",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "medium",
"timestamp": "2026-01-04T19:06:00Z",
"trace_id": "69e8360d-6caf-a28d-2389-664d40bd2b71"
} | {
"account_age_days": 480,
"account_id": "ACCT-32CACB42B531",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_1",
"session_entropy": 0.763
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 619,
"timestamp": "2026-01-04T19:06:00Z",
"transaction_amount_usd": 1256095.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.801,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3198017.49,
"financial_exposure_usd": 4902473.65,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108066",
"label": "benign",
"label_confidence": 0.724,
"severity": "low",
"timestamp": "2026-01-06T14:26:00Z",
"trace_id": "47b0e8c4-f7e2-7e56-5e1e-d4b843622f8b"
} | {
"account_age_days": 1735,
"account_id": "ACCT-B33653613DC0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.285
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 89,
"timestamp": "2026-01-06T14:26:00Z",
"transaction_amount_usd": 14121.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 2772.48,
"financial_exposure_usd": 3072.5,
"recoverable_pct": 0.673
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100003",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-01T00:03:00Z",
"trace_id": "fbf24050-a748-dbcf-ac61-9e630dde29a6"
} | {
"account_age_days": 1198,
"account_id": "ACCT-14FCDD549E8F",
"baseline_risk_score": 0.606,
"kyc_tier": "tier_3",
"session_entropy": 0.456
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 178,
"timestamp": "2025-12-31T12:38:00Z",
"transaction_amount_usd": 21.54
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.54,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 109604.76,
"financial_exposure_usd": 209747.59,
"recoverable_pct": 0.609
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103739",
"label": "fraudulent",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-03T14:19:00Z",
"trace_id": "6516815d-c29f-9428-7efb-2b386aa0d545"
} | {
"account_age_days": 386,
"account_id": "ACCT-77422580DED7",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_3",
"session_entropy": 0.114
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 750,
"timestamp": "2026-01-03T14:19:00Z",
"transaction_amount_usd": 565548.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.741,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2789587.17,
"financial_exposure_usd": 3658749.84,
"recoverable_pct": 0.743
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102634",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "high",
"timestamp": "2026-01-02T19:54:00Z",
"trace_id": "c4e3a4d5-7e15-8dba-fa82-3e7bd704afe3"
} | {
"account_age_days": 351,
"account_id": "ACCT-2FA7AE4A3E98",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.935
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1095,
"timestamp": "2026-01-02T19:54:00Z",
"transaction_amount_usd": 69854.06
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.569,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1116804.03,
"financial_exposure_usd": 1355302.66,
"recoverable_pct": 0.072
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101523",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-02T01:23:00Z",
"trace_id": "37867b55-5fe5-5882-2a47-369a76e7f143"
} | {
"account_age_days": 1846,
"account_id": "ACCT-8583822A301B",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_2",
"session_entropy": 0.464
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 703,
"timestamp": "2026-01-02T01:23:00Z",
"transaction_amount_usd": 19831.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 800864.37,
"financial_exposure_usd": 964838.91,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102806",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-02T22:46:00Z",
"trace_id": "587f2d51-a949-9fea-b182-f2e2e831928c"
} | {
"account_age_days": 411,
"account_id": "ACCT-A63C36FED122",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_2",
"session_entropy": 0.852
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 825,
"timestamp": "2026-01-02T22:46:00Z",
"transaction_amount_usd": 62925.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.632,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1013250.64,
"financial_exposure_usd": 1649293.12,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105215",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-04T14:55:00Z",
"trace_id": "1580efab-9bdd-5426-6bd9-05834bd45780"
} | {
"account_age_days": 1944,
"account_id": "ACCT-5C143C592122",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_3",
"session_entropy": 0.592
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 588,
"timestamp": "2026-01-04T14:55:00Z",
"transaction_amount_usd": 2206207.52
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.932,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1308740.37,
"financial_exposure_usd": 3096700.06,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104962",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "low",
"timestamp": "2026-01-04T10:42:00Z",
"trace_id": "7a9c90a9-0f0c-e621-04ad-ae1f8054324b"
} | {
"account_age_days": 1719,
"account_id": "ACCT-AFCF03F9D07A",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_1",
"session_entropy": 0.788
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 552,
"timestamp": "2026-01-04T10:42:00Z",
"transaction_amount_usd": 1753201.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.609,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1355894.73,
"financial_exposure_usd": 2203831.78,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106139",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-05T06:19:00Z",
"trace_id": "045a4425-669e-2a58-2faa-36e2f9f6ca04"
} | {
"account_age_days": 730,
"account_id": "ACCT-CEB9FDD3A494",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_2",
"session_entropy": 0.816
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 357,
"timestamp": "2026-01-05T06:19:00Z",
"transaction_amount_usd": 1876188.74
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.857,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3519550.43,
"financial_exposure_usd": 4760704.18,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102816",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-02T22:56:00Z",
"trace_id": "fe5d11dd-9349-9fba-7c98-c18448879bb1"
} | {
"account_age_days": 961,
"account_id": "ACCT-D529A58621A4",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 246,
"timestamp": "2026-01-02T22:56:00Z",
"transaction_amount_usd": 22270.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 242096.08,
"financial_exposure_usd": 285776.64,
"recoverable_pct": 0.643
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102351",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-02T15:11:00Z",
"trace_id": "bb68c895-0a2e-45a1-25d7-d04e543dc79d"
} | {
"account_age_days": 1441,
"account_id": "ACCT-15B9704CF823",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_1",
"session_entropy": 0.343
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 710,
"timestamp": "2026-01-02T15:11:00Z",
"transaction_amount_usd": 100209.31
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.62,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 118581.28,
"financial_exposure_usd": 131834.48,
"recoverable_pct": 0.366
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105532",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-04T20:12:00Z",
"trace_id": "9412dbb5-7a29-43b7-eb2d-57f34246753e"
} | {
"account_age_days": 1230,
"account_id": "ACCT-AFFE2778012A",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_2",
"session_entropy": 0.804
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 88,
"timestamp": "2026-01-04T09:50:00Z",
"transaction_amount_usd": 21.84
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5718638.94,
"financial_exposure_usd": 6370845.18,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105211",
"label": "fraudulent",
"label_confidence": 0.652,
"severity": "critical",
"timestamp": "2026-01-04T14:51:00Z",
"trace_id": "bc904c9d-ba06-5a6a-86e2-5333a0580919"
} | {
"account_age_days": 1616,
"account_id": "ACCT-00A1118AF1A6",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_3",
"session_entropy": 0.167
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 234,
"timestamp": "2026-01-04T06:32:00Z",
"transaction_amount_usd": 8.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2881001.89,
"financial_exposure_usd": 3363352.05,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107523",
"label": "benign",
"label_confidence": 0.545,
"severity": "critical",
"timestamp": "2026-01-06T05:23:00Z",
"trace_id": "828c17de-4930-301e-73bf-a191a7f96bb4"
} | {
"account_age_days": 115,
"account_id": "ACCT-9F4A1747ED25",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.336
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 111,
"timestamp": "2026-01-06T05:23:00Z",
"transaction_amount_usd": 7699.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2751.86,
"financial_exposure_usd": 3561.84,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109418",
"label": "benign",
"label_confidence": 0.715,
"severity": "low",
"timestamp": "2026-01-07T12:58:00Z",
"trace_id": "b3328616-1ae9-2169-699d-f2db0d0fcd2b"
} | {
"account_age_days": 473,
"account_id": "ACCT-9692DD1EF9C7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.597
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1097,
"timestamp": "2026-01-07T12:58:00Z",
"transaction_amount_usd": 7859.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 915.85,
"financial_exposure_usd": 994.17,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104005",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-03T18:45:00Z",
"trace_id": "92b1008c-6556-6842-079c-359838590726"
} | {
"account_age_days": 474,
"account_id": "ACCT-72524E1A1A22",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.428
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 140,
"timestamp": "2026-01-03T16:24:00Z",
"transaction_amount_usd": 5.12
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.422,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7538701.52,
"financial_exposure_usd": 8813780.32,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108701",
"label": "benign",
"label_confidence": 0.466,
"severity": "low",
"timestamp": "2026-01-07T01:01:00Z",
"trace_id": "63d211f4-aec4-6515-3b48-8fcad2b38d9d"
} | {
"account_age_days": 399,
"account_id": "ACCT-F42ABE376B31",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.74
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 237,
"timestamp": "2026-01-06T20:02:00Z",
"transaction_amount_usd": 22.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1479.04,
"financial_exposure_usd": 1666.07,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105239",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "medium",
"timestamp": "2026-01-04T15:19:00Z",
"trace_id": "a410b4f7-7d7b-4479-df28-bb7c1587b94d"
} | {
"account_age_days": 1801,
"account_id": "ACCT-7A09D6B395C1",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_2",
"session_entropy": 0.758
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 188,
"timestamp": "2026-01-04T06:12:00Z",
"transaction_amount_usd": 23.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.949,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2272385.51,
"financial_exposure_usd": 2487353.02,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105764",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "high",
"timestamp": "2026-01-05T00:04:00Z",
"trace_id": "e655cc1b-1985-698a-a7ea-fb566c0a83da"
} | {
"account_age_days": 1314,
"account_id": "ACCT-7DE2A769B7DA",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_3",
"session_entropy": 0.622
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 970,
"timestamp": "2026-01-05T00:04:00Z",
"transaction_amount_usd": 2920691.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.528,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 971464.95,
"financial_exposure_usd": 1280155,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106497",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "critical",
"timestamp": "2026-01-05T12:17:00Z",
"trace_id": "be0bb054-6b13-41b0-fd76-f1d5b2d8b9fe"
} | {
"account_age_days": 1711,
"account_id": "ACCT-A0AC105020F6",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_1",
"session_entropy": 0.556
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 241,
"timestamp": "2026-01-05T12:17:00Z",
"transaction_amount_usd": 2922671.98
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.867,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3946311.22,
"financial_exposure_usd": 4110633.91,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104508",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-04T03:08:00Z",
"trace_id": "6f5cf88f-4782-df12-4c86-04d32bb1cb0c"
} | {
"account_age_days": 1717,
"account_id": "ACCT-824567A97DCE",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_3",
"session_entropy": 0.841
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 86,
"timestamp": "2026-01-03T19:05:00Z",
"transaction_amount_usd": 3.69
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.737,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1003429.1,
"financial_exposure_usd": 1591564.86,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104472",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-04T02:32:00Z",
"trace_id": "f1ac7722-2db1-13b7-ed5e-a4c4980fa21c"
} | {
"account_age_days": 1771,
"account_id": "ACCT-EF53E2F8CABA",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_1",
"session_entropy": 0.792
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 780,
"timestamp": "2026-01-04T02:32:00Z",
"transaction_amount_usd": 1970263.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.367,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 873663.71,
"financial_exposure_usd": 1974144.6,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106453",
"label": "fraudulent",
"label_confidence": 0.739,
"severity": "critical",
"timestamp": "2026-01-05T11:33:00Z",
"trace_id": "bfc51483-875e-12ff-3b81-af43749bf6e9"
} | {
"account_age_days": 60,
"account_id": "ACCT-7C349FB5BE9F",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.318
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 212,
"timestamp": "2026-01-05T11:33:00Z",
"transaction_amount_usd": 2253317.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5690639.68,
"financial_exposure_usd": 7804133.13,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100332",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "high",
"timestamp": "2026-01-01T05:32:00Z",
"trace_id": "9eed7567-e3ee-62db-0680-ee6db3831f62"
} | {
"account_age_days": 483,
"account_id": "ACCT-F62E329E32C2",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.278
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 217,
"timestamp": "2025-12-31T21:08:00Z",
"transaction_amount_usd": 14.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 420620.22,
"financial_exposure_usd": 686643.83,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107015",
"label": "benign",
"label_confidence": 0.575,
"severity": "high",
"timestamp": "2026-01-05T20:55:00Z",
"trace_id": "dc8a7108-ff1b-094d-3609-9b18cbb8c9d6"
} | {
"account_age_days": 254,
"account_id": "ACCT-B2BDA554FB77",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 793,
"timestamp": "2026-01-05T20:55:00Z",
"transaction_amount_usd": 9013.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2563.46,
"financial_exposure_usd": 3345.99,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100832",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-01T13:52:00Z",
"trace_id": "b97ec8a1-bc43-0e68-392e-f388c327abb1"
} | {
"account_age_days": 3,
"account_id": "ACCT-B42094269B00",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_2",
"session_entropy": 0.622
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 220,
"timestamp": "2026-01-01T03:49:00Z",
"transaction_amount_usd": 18.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.53,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 501683.8,
"financial_exposure_usd": 651754.83,
"recoverable_pct": 0.33
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102895",
"label": "fraudulent",
"label_confidence": 0.958,
"severity": "critical",
"timestamp": "2026-01-03T00:15:00Z",
"trace_id": "f09e4393-6a06-5435-ca64-3c14200649e6"
} | {
"account_age_days": 625,
"account_id": "ACCT-410E10F64D33",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.56
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 873,
"timestamp": "2026-01-03T00:15:00Z",
"transaction_amount_usd": 101745.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.409,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 217739.02,
"financial_exposure_usd": 530829.11,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107957",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-06T12:37:00Z",
"trace_id": "53ec957b-54be-c697-e1c7-db291d9b5730"
} | {
"account_age_days": 1040,
"account_id": "ACCT-71D31BB7C499",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_1",
"session_entropy": 0.449
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 609,
"timestamp": "2026-01-06T12:37:00Z",
"transaction_amount_usd": 9791.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 796.51,
"financial_exposure_usd": 1858.28,
"recoverable_pct": 0.871
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104842",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "low",
"timestamp": "2026-01-04T08:42:00Z",
"trace_id": "4f6230e2-7d06-64cc-05b5-8aac8f1a90d2"
} | {
"account_age_days": 1820,
"account_id": "ACCT-EB503F0368C7",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.88
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1029,
"timestamp": "2026-01-04T08:42:00Z",
"transaction_amount_usd": 399752.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.881,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1406703.52,
"financial_exposure_usd": 2272691.04,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105095",
"label": "fraudulent",
"label_confidence": 0.72,
"severity": "medium",
"timestamp": "2026-01-04T12:55:00Z",
"trace_id": "b38863a7-237c-62e3-bcef-e5bc049d1f5f"
} | {
"account_age_days": 546,
"account_id": "ACCT-FB096D355518",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_2",
"session_entropy": 0.564
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1126,
"timestamp": "2026-01-04T12:55:00Z",
"transaction_amount_usd": 2075395.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2369362.85,
"financial_exposure_usd": 3839451.97,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109384",
"label": "benign",
"label_confidence": 0.572,
"severity": "medium",
"timestamp": "2026-01-07T12:24:00Z",
"trace_id": "769c7b66-01d7-c526-4dcb-5caed0686ad5"
} | {
"account_age_days": 930,
"account_id": "ACCT-8084EB0F2949",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 234,
"timestamp": "2026-01-07T05:45:00Z",
"transaction_amount_usd": 17.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2210.35,
"financial_exposure_usd": 4652.87,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104024",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "low",
"timestamp": "2026-01-03T19:04:00Z",
"trace_id": "dea31cdf-70f8-b05e-3b29-323aaf4e69d5"
} | {
"account_age_days": 93,
"account_id": "ACCT-E0335D0A0404",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_3",
"session_entropy": 0.579
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 687,
"timestamp": "2026-01-03T19:04:00Z",
"transaction_amount_usd": 1677222.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.519,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 7403179.36,
"financial_exposure_usd": 7444022.34,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102508",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-02T17:48:00Z",
"trace_id": "05d93c02-6d55-8867-1751-ad7cf1f1b847"
} | {
"account_age_days": 802,
"account_id": "ACCT-CDE7F18BF448",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_3",
"session_entropy": 0.452
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 925,
"timestamp": "2026-01-02T17:48:00Z",
"transaction_amount_usd": 50808.87
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.668,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 656350.86,
"financial_exposure_usd": 1016773.16,
"recoverable_pct": 0.349
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108692",
"label": "benign",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-07T00:52:00Z",
"trace_id": "321766f5-1c42-d933-3ce8-51dd80a48d04"
} | {
"account_age_days": 1421,
"account_id": "ACCT-1A9F51F7643F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.249
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 218,
"timestamp": "2026-01-06T23:16:00Z",
"transaction_amount_usd": 6.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2694.43,
"financial_exposure_usd": 3195.85,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107475",
"label": "benign",
"label_confidence": 0.741,
"severity": "low",
"timestamp": "2026-01-06T04:35:00Z",
"trace_id": "82b5034c-259e-a579-6872-bab453543bbe"
} | {
"account_age_days": 2000,
"account_id": "ACCT-3C29F433DB74",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.246
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 102,
"timestamp": "2026-01-06T04:35:00Z",
"transaction_amount_usd": 2969.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2537.74,
"financial_exposure_usd": 4249.86,
"recoverable_pct": 0.444
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104443",
"label": "fraudulent",
"label_confidence": 0.609,
"severity": "high",
"timestamp": "2026-01-04T02:03:00Z",
"trace_id": "cf22ed77-2d7c-e9cc-8c68-f065bc2469c2"
} | {
"account_age_days": 723,
"account_id": "ACCT-CE240ED3A096",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_3",
"session_entropy": 0.31
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 976,
"timestamp": "2026-01-04T02:03:00Z",
"transaction_amount_usd": 1861224.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.841,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1686174.07,
"financial_exposure_usd": 3801212.12,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102041",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-02T10:01:00Z",
"trace_id": "981e2a5d-8424-a141-81a8-aee650147331"
} | {
"account_age_days": 852,
"account_id": "ACCT-B8F23E44E0B3",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.524
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 524,
"timestamp": "2026-01-02T10:01:00Z",
"transaction_amount_usd": 97565.54
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.745,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1150103.09,
"financial_exposure_usd": 1198592.8,
"recoverable_pct": 0.2
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100395",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-01T06:35:00Z",
"trace_id": "d12e73a1-75f1-afb8-e28a-11d12f45428a"
} | {
"account_age_days": 908,
"account_id": "ACCT-F9C7EC6E82DB",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_2",
"session_entropy": 0.766
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 136,
"timestamp": "2026-01-01T01:48:00Z",
"transaction_amount_usd": 22.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.358,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 470792.94,
"financial_exposure_usd": 719495.19,
"recoverable_pct": 0.199
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100240",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "high",
"timestamp": "2026-01-01T04:00:00Z",
"trace_id": "4ac98d23-c0a5-c337-4a34-61e7a54680ad"
} | {
"account_age_days": 1896,
"account_id": "ACCT-F3FEB7DEA2E0",
"baseline_risk_score": 0.565,
"kyc_tier": "tier_3",
"session_entropy": 0.898
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 331,
"timestamp": "2025-12-31T23:01:00Z",
"transaction_amount_usd": 13.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.425,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 371189.25,
"financial_exposure_usd": 662026.47,
"recoverable_pct": 0.04
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101704",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-02T04:24:00Z",
"trace_id": "faf714e3-ce08-783c-ba3d-34231c24cb0b"
} | {
"account_age_days": 22,
"account_id": "ACCT-D363A4E1F15F",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_1",
"session_entropy": 0.233
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 252,
"timestamp": "2026-01-02T04:24:00Z",
"transaction_amount_usd": 114782.34
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.761,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 323679.6,
"financial_exposure_usd": 394811.34,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100131",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "high",
"timestamp": "2026-01-01T02:11:00Z",
"trace_id": "cf265489-2ec7-5a83-bffa-7a4f0f1972db"
} | {
"account_age_days": 1300,
"account_id": "ACCT-D007CD41F122",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_2",
"session_entropy": 0.374
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 120,
"timestamp": "2025-12-31T22:13:00Z",
"transaction_amount_usd": 15.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 257800.24,
"financial_exposure_usd": 319551.03,
"recoverable_pct": 0.199
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100783",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-01T13:03:00Z",
"trace_id": "b45cbd5a-a02f-8aab-8025-613ada8273ca"
} | {
"account_age_days": 836,
"account_id": "ACCT-BBFD4A020A11",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.477
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 282,
"timestamp": "2026-01-01T13:03:00Z",
"transaction_amount_usd": 105585.98
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.949,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 425178.39,
"financial_exposure_usd": 802827.83,
"recoverable_pct": 0.151
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109058",
"label": "benign",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-07T06:58:00Z",
"trace_id": "ab8de7e5-e1ed-aa8f-9941-cde82c81fe97"
} | {
"account_age_days": 1611,
"account_id": "ACCT-ADADC7B167AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.585
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 459,
"timestamp": "2026-01-07T06:58:00Z",
"transaction_amount_usd": 6434.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1182.26,
"financial_exposure_usd": 1662.55,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109333",
"label": "benign",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-07T11:33:00Z",
"trace_id": "869e70f5-3bad-ada0-c341-5a95ef5b7cf4"
} | {
"account_age_days": 1154,
"account_id": "ACCT-8F3C97AF10DD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.776
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 93,
"timestamp": "2026-01-07T11:33:00Z",
"transaction_amount_usd": 9561.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1336.89,
"financial_exposure_usd": 2743.07,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107089",
"label": "benign",
"label_confidence": 0.494,
"severity": "medium",
"timestamp": "2026-01-05T22:09:00Z",
"trace_id": "823814f6-a2a5-9ceb-dc87-330e99bb0ea8"
} | {
"account_age_days": 1798,
"account_id": "ACCT-313E5F9418F6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.456
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 326,
"timestamp": "2026-01-05T20:35:00Z",
"transaction_amount_usd": 1.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.481,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1173.4,
"financial_exposure_usd": 1193.57,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102633",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-02T19:53:00Z",
"trace_id": "9dfece16-9843-c3cf-6f18-449fa255e94b"
} | {
"account_age_days": 964,
"account_id": "ACCT-81178F0C4B88",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_2",
"session_entropy": 0.321
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 808,
"timestamp": "2026-01-02T19:53:00Z",
"transaction_amount_usd": 36781.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 476298.69,
"financial_exposure_usd": 881423.8,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106829",
"label": "benign",
"label_confidence": 0.6,
"severity": "medium",
"timestamp": "2026-01-05T17:49:00Z",
"trace_id": "f1828229-7a18-71d8-d5ae-dc89616aa84b"
} | {
"account_age_days": 1160,
"account_id": "ACCT-3065C3E82EDD",
"baseline_risk_score": 0.15,
"kyc_tier": "tier_3",
"session_entropy": 0.615
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 168,
"timestamp": "2026-01-05T17:49:00Z",
"transaction_amount_usd": 7969.18
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1106.52,
"financial_exposure_usd": 1664.74,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105975",
"label": "fraudulent",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-05T03:35:00Z",
"trace_id": "2551436f-2cde-f122-c918-ff806808e11c"
} | {
"account_age_days": 1079,
"account_id": "ACCT-CDAEAFD7450B",
"baseline_risk_score": 0.23,
"kyc_tier": "tier_1",
"session_entropy": 0.318
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 101,
"timestamp": "2026-01-05T00:09:00Z",
"transaction_amount_usd": 1.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.425,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3682458.01,
"financial_exposure_usd": 5960383.22,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108008",
"label": "benign",
"label_confidence": 0.47,
"severity": "medium",
"timestamp": "2026-01-06T13:28:00Z",
"trace_id": "44ccb34a-5c7b-8fb7-c3f1-2993cc786d44"
} | {
"account_age_days": 1606,
"account_id": "ACCT-CDC7A813ABC3",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_2",
"session_entropy": 0.575
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 288,
"timestamp": "2026-01-06T13:28:00Z",
"transaction_amount_usd": 10972.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2726.15,
"financial_exposure_usd": 4448.18,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107869",
"label": "benign",
"label_confidence": 0.694,
"severity": "low",
"timestamp": "2026-01-06T11:09:00Z",
"trace_id": "89c62ee0-1fa5-1074-f898-249b8c4a0292"
} | {
"account_age_days": 518,
"account_id": "ACCT-3ECCCD22762E",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1020,
"timestamp": "2026-01-06T11:09:00Z",
"transaction_amount_usd": 8645.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2185.67,
"financial_exposure_usd": 4159.29,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100212",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "high",
"timestamp": "2026-01-01T03:32:00Z",
"trace_id": "4badb973-1ed0-1243-9ae6-9d9798fb7955"
} | {
"account_age_days": 1464,
"account_id": "ACCT-0E4CC98382FF",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_1",
"session_entropy": 0.714
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 850,
"timestamp": "2026-01-01T03:32:00Z",
"transaction_amount_usd": 23795.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.388,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 485092.09,
"financial_exposure_usd": 1002366.44,
"recoverable_pct": 0.087
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104080",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-03T20:00:00Z",
"trace_id": "6be7f4ee-c388-8b12-8f84-43b0a6555114"
} | {
"account_age_days": 1580,
"account_id": "ACCT-D0C3F658CEDE",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_2",
"session_entropy": 0.469
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 278,
"timestamp": "2026-01-03T20:00:00Z",
"transaction_amount_usd": 1036311.89
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.396,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2420353.5,
"financial_exposure_usd": 4329241.74,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103087",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "critical",
"timestamp": "2026-01-03T03:27:00Z",
"trace_id": "27ae2af5-2d48-b3bf-8406-a022687e6d00"
} | {
"account_age_days": 1954,
"account_id": "ACCT-51E11372A372",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_2",
"session_entropy": 0.675
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 659,
"timestamp": "2026-01-03T03:27:00Z",
"transaction_amount_usd": 49152.02
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.915,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 215520.36,
"financial_exposure_usd": 484637.48,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108316",
"label": "benign",
"label_confidence": 0.491,
"severity": "high",
"timestamp": "2026-01-06T18:36:00Z",
"trace_id": "2f7ebdac-c2d9-caf1-ea18-e3177ab9185e"
} | {
"account_age_days": 453,
"account_id": "ACCT-7486AC9A32AD",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_1",
"session_entropy": 0.801
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 258,
"timestamp": "2026-01-06T15:30:00Z",
"transaction_amount_usd": 16.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1789.29,
"financial_exposure_usd": 2083.5,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109175",
"label": "benign",
"label_confidence": 0.597,
"severity": "high",
"timestamp": "2026-01-07T08:55:00Z",
"trace_id": "a35d4d83-7692-7762-5c23-af54c4d6e4aa"
} | {
"account_age_days": 640,
"account_id": "ACCT-66613BE49E38",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 551,
"timestamp": "2026-01-07T08:55:00Z",
"transaction_amount_usd": 1783.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1198.91,
"financial_exposure_usd": 1594.5,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105561",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "high",
"timestamp": "2026-01-04T20:41:00Z",
"trace_id": "cfbb99b8-3dca-a18f-0837-a955f0cc684c"
} | {
"account_age_days": 1248,
"account_id": "ACCT-089DDB3CDDC7",
"baseline_risk_score": 0.211,
"kyc_tier": "tier_2",
"session_entropy": 0.285
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 786,
"timestamp": "2026-01-04T20:41:00Z",
"transaction_amount_usd": 1605893.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.779,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3594874,
"financial_exposure_usd": 4534022.34,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109406",
"label": "benign",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-07T12:46:00Z",
"trace_id": "9f18e367-a612-1a79-4270-f906fbca6d82"
} | {
"account_age_days": 851,
"account_id": "ACCT-7DE5D2A019FD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.137
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 487,
"timestamp": "2026-01-07T12:46:00Z",
"transaction_amount_usd": 303.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1128.96,
"financial_exposure_usd": 2147.04,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100028",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "medium",
"timestamp": "2026-01-01T00:28:00Z",
"trace_id": "2999bbef-518b-2f21-9cf2-0859ee6e2e72"
} | {
"account_age_days": 1871,
"account_id": "ACCT-F4E957345052",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_3",
"session_entropy": 0.247
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1123,
"timestamp": "2026-01-01T00:28:00Z",
"transaction_amount_usd": 88848.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.678,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 795615.91,
"financial_exposure_usd": 1038600.77,
"recoverable_pct": 0.163
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107065",
"label": "benign",
"label_confidence": 0.648,
"severity": "high",
"timestamp": "2026-01-05T21:45:00Z",
"trace_id": "20f31913-4c08-c775-3ce9-855149d73e4c"
} | {
"account_age_days": 1458,
"account_id": "ACCT-183564B260A9",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_2",
"session_entropy": 0.846
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 110,
"timestamp": "2026-01-05T21:45:00Z",
"transaction_amount_usd": 13383.05
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.491,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 257.68,
"financial_exposure_usd": 352.34,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106070",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-05T05:10:00Z",
"trace_id": "c59fd0e0-d81f-9f2e-9da1-17cf9d537db5"
} | {
"account_age_days": 1163,
"account_id": "ACCT-A31658ED7F25",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.133
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 347,
"timestamp": "2026-01-04T19:44:00Z",
"transaction_amount_usd": 14.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3832620.17,
"financial_exposure_usd": 8708750,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103980",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "high",
"timestamp": "2026-01-03T18:20:00Z",
"trace_id": "ae00a356-1eec-873a-b59c-b08f06273117"
} | {
"account_age_days": 66,
"account_id": "ACCT-EBB158CE2E6B",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.856
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 633,
"timestamp": "2026-01-03T18:20:00Z",
"transaction_amount_usd": 2037424.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.779,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3553046.28,
"financial_exposure_usd": 4726602.34,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100819",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-01T13:39:00Z",
"trace_id": "b3522f65-69bb-560e-145b-b8756a273456"
} | {
"account_age_days": 234,
"account_id": "ACCT-39C9867A19F6",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_3",
"session_entropy": 0.854
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 1017,
"timestamp": "2026-01-01T13:39:00Z",
"transaction_amount_usd": 53686.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.665,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 668703.12,
"financial_exposure_usd": 1008689.09,
"recoverable_pct": 0.237
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104526",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "low",
"timestamp": "2026-01-04T03:26:00Z",
"trace_id": "604197fa-bb2f-f0cb-eeae-b1dbf2b6b1c8"
} | {
"account_age_days": 1717,
"account_id": "ACCT-FA3CDFFC97A2",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.256
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 214,
"timestamp": "2026-01-03T18:05:00Z",
"transaction_amount_usd": 3.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.386,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2421588.36,
"financial_exposure_usd": 4553379.68,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105182",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "critical",
"timestamp": "2026-01-04T14:22:00Z",
"trace_id": "eea90570-7def-bdb9-45c0-b4aa01c824ef"
} | {
"account_age_days": 539,
"account_id": "ACCT-6AFF0C7F85F4",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_1",
"session_entropy": 0.375
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1140,
"timestamp": "2026-01-04T14:22:00Z",
"transaction_amount_usd": 1557420.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1683342.23,
"financial_exposure_usd": 4110268.11,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109199",
"label": "benign",
"label_confidence": 0.658,
"severity": "low",
"timestamp": "2026-01-07T09:19:00Z",
"trace_id": "c747b4d6-e375-5077-b455-73f5fdaf8565"
} | {
"account_age_days": 158,
"account_id": "ACCT-A4C4D839AD17",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 184,
"timestamp": "2026-01-07T04:06:00Z",
"transaction_amount_usd": 4.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 647.78,
"financial_exposure_usd": 746.46,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100231",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "critical",
"timestamp": "2026-01-01T03:51:00Z",
"trace_id": "87dec2ea-0118-d2a5-43ef-054265126fe3"
} | {
"account_age_days": 1569,
"account_id": "ACCT-F713A7F84522",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_2",
"session_entropy": 0.252
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 220,
"timestamp": "2025-12-31T23:02:00Z",
"transaction_amount_usd": 10.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 495863.63,
"financial_exposure_usd": 701891.38,
"recoverable_pct": 0.409
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103937",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "high",
"timestamp": "2026-01-03T17:37:00Z",
"trace_id": "1be1a14b-4df4-2719-f816-5b07401d99e4"
} | {
"account_age_days": 100,
"account_id": "ACCT-665E70297045",
"baseline_risk_score": 0.111,
"kyc_tier": "tier_2",
"session_entropy": 0.91
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 890,
"timestamp": "2026-01-03T17:37:00Z",
"transaction_amount_usd": 1733724.3
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.421,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6466148.21,
"financial_exposure_usd": 6546628.22,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102826",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "medium",
"timestamp": "2026-01-02T23:06:00Z",
"trace_id": "de38b3ba-e914-1455-87ac-8b144ccfbdf2"
} | {
"account_age_days": 440,
"account_id": "ACCT-E30AB7016B04",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_2",
"session_entropy": 0.355
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 462,
"timestamp": "2026-01-02T23:06:00Z",
"transaction_amount_usd": 611.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 355420.56,
"financial_exposure_usd": 613286.13,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100945",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "critical",
"timestamp": "2026-01-01T15:45:00Z",
"trace_id": "ec58211d-a9dd-cb77-d8ad-9dcef9fa3ffe"
} | {
"account_age_days": 242,
"account_id": "ACCT-8F3B21470E3D",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_3",
"session_entropy": 0.758
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 326,
"timestamp": "2026-01-01T15:45:00Z",
"transaction_amount_usd": 89061.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 685738.93,
"financial_exposure_usd": 746482.42,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100550",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "low",
"timestamp": "2026-01-01T09:10:00Z",
"trace_id": "0899c691-2d61-ea88-fba7-78b92fdd77cd"
} | {
"account_age_days": 290,
"account_id": "ACCT-363263FA6C49",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 645,
"timestamp": "2026-01-01T09:10:00Z",
"transaction_amount_usd": 86736.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 985454.76,
"financial_exposure_usd": 1251795.16,
"recoverable_pct": 0.404
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105863",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-05T01:43:00Z",
"trace_id": "f247b984-f842-deba-2c53-1b45632c6b6a"
} | {
"account_age_days": 1319,
"account_id": "ACCT-7C667AC2054E",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_1",
"session_entropy": 0.611
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 362,
"timestamp": "2026-01-05T01:43:00Z",
"transaction_amount_usd": 76531.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.828,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3494179.24,
"financial_exposure_usd": 4697769.95,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107903",
"label": "benign",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-06T11:43:00Z",
"trace_id": "3d868cbc-1185-21f0-5f40-7d5e8ff7e8cf"
} | {
"account_age_days": 947,
"account_id": "ACCT-D7389ECE259D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.121
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 631,
"timestamp": "2026-01-06T11:43:00Z",
"transaction_amount_usd": 8304.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 7040.19,
"financial_exposure_usd": 9711.57,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106523",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "low",
"timestamp": "2026-01-05T12:43:00Z",
"trace_id": "dff6239c-6b53-3d4f-67a8-42b029d0ec12"
} | {
"account_age_days": 1916,
"account_id": "ACCT-483108733B76",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_2",
"session_entropy": 0.653
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 244,
"timestamp": "2026-01-05T05:22:00Z",
"transaction_amount_usd": 20.99
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5372872.78,
"financial_exposure_usd": 6661959.22,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105569",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "medium",
"timestamp": "2026-01-04T20:49:00Z",
"trace_id": "6d5c9517-2baf-0c1e-f3e3-56c7787f53c6"
} | {
"account_age_days": 1082,
"account_id": "ACCT-AB71C892A967",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_1",
"session_entropy": 0.904
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 765,
"timestamp": "2026-01-04T20:49:00Z",
"transaction_amount_usd": 95264.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.602,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2036921.55,
"financial_exposure_usd": 3294451.22,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.