schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107909",
"label": "benign",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-06T11:49:00Z",
"trace_id": "4b9d1ec6-fa4b-9162-aba6-e05baf4e71c4"
} | {
"account_age_days": 577,
"account_id": "ACCT-AFFBBEFC0831",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.501
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 522,
"timestamp": "2026-01-06T11:49:00Z",
"transaction_amount_usd": 5953.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2786.8,
"financial_exposure_usd": 3069.28,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104993",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-04T11:13:00Z",
"trace_id": "e29a9b61-6220-3959-68f7-002cbaedd14d"
} | {
"account_age_days": 1547,
"account_id": "ACCT-2EB62AB756EA",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_1",
"session_entropy": 0.222
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 937,
"timestamp": "2026-01-04T11:13:00Z",
"transaction_amount_usd": 703623.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.814,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4359292.95,
"financial_exposure_usd": 5724856.43,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104622",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-04T05:02:00Z",
"trace_id": "d50225d8-b710-13f0-f084-5d9ffe80a52f"
} | {
"account_age_days": 1604,
"account_id": "ACCT-7BD28EBDC85F",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_1",
"session_entropy": 0.307
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1189,
"timestamp": "2026-01-04T05:02:00Z",
"transaction_amount_usd": 2136518.41
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6812352.18,
"financial_exposure_usd": 7904682.86,
"recoverable_pct": 0.565
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101310",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-01T21:50:00Z",
"trace_id": "8b4f7de7-4aab-1963-c964-fb4fc678b0c7"
} | {
"account_age_days": 1246,
"account_id": "ACCT-A1E2C99569D2",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_2",
"session_entropy": 0.648
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 166,
"timestamp": "2026-01-01T15:14:00Z",
"transaction_amount_usd": 13.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.673,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1071381.52,
"financial_exposure_usd": 1103942.15,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101946",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-02T08:26:00Z",
"trace_id": "754a8e26-6cd0-393f-741a-ae61f863658e"
} | {
"account_age_days": 341,
"account_id": "ACCT-5F9932765177",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_2",
"session_entropy": 0.723
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 997,
"timestamp": "2026-01-02T08:26:00Z",
"transaction_amount_usd": 118577.93
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.836,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 272843.62,
"financial_exposure_usd": 499399.38,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105191",
"label": "fraudulent",
"label_confidence": 0.723,
"severity": "medium",
"timestamp": "2026-01-04T14:31:00Z",
"trace_id": "1fb5c0f3-bccb-eaeb-4cba-34901d873823"
} | {
"account_age_days": 1759,
"account_id": "ACCT-24B540099C00",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_1",
"session_entropy": 0.305
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 581,
"timestamp": "2026-01-04T14:31:00Z",
"transaction_amount_usd": 268482.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.579,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3897734.76,
"financial_exposure_usd": 5759692.33,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105634",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "medium",
"timestamp": "2026-01-04T21:54:00Z",
"trace_id": "53437a95-2c54-7f7a-fe8a-4cea1cc01e5e"
} | {
"account_age_days": 1905,
"account_id": "ACCT-75AD8130C46B",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_3",
"session_entropy": 0.435
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 622,
"timestamp": "2026-01-04T21:54:00Z",
"transaction_amount_usd": 1560599.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.918,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3332309.6,
"financial_exposure_usd": 6034644.38,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107127",
"label": "benign",
"label_confidence": 0.657,
"severity": "low",
"timestamp": "2026-01-05T22:47:00Z",
"trace_id": "7e0a9847-fb1a-9a20-369f-c4c42cf633a4"
} | {
"account_age_days": 1379,
"account_id": "ACCT-52244FDA5F0F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.405
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 267,
"timestamp": "2026-01-05T14:39:00Z",
"transaction_amount_usd": 21.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.654,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4265.77,
"financial_exposure_usd": 5287.58,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100158",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "medium",
"timestamp": "2026-01-01T02:38:00Z",
"trace_id": "b5ccdbe6-4d17-1ebc-5a45-b8ead3e763d1"
} | {
"account_age_days": 1982,
"account_id": "ACCT-AE50F96E7760",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_2",
"session_entropy": 0.228
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 632,
"timestamp": "2026-01-01T02:38:00Z",
"transaction_amount_usd": 93055.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.685,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 237253.81,
"financial_exposure_usd": 407521.4,
"recoverable_pct": 0.245
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106342",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "low",
"timestamp": "2026-01-05T09:42:00Z",
"trace_id": "d8dbfdb8-bd82-5d96-8685-348b59471d51"
} | {
"account_age_days": 1386,
"account_id": "ACCT-768A27A3636E",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_1",
"session_entropy": 0.399
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 310,
"timestamp": "2026-01-05T09:42:00Z",
"transaction_amount_usd": 1570831.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3108280.78,
"financial_exposure_usd": 4215793.65,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106001",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-05T04:01:00Z",
"trace_id": "b12d097e-8b13-57a6-50e8-74b12297e79f"
} | {
"account_age_days": 1719,
"account_id": "ACCT-796E242760A1",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_1",
"session_entropy": 0.124
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1141,
"timestamp": "2026-01-05T04:01:00Z",
"transaction_amount_usd": 891764.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4655586.12,
"financial_exposure_usd": 5405156.73,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103020",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-03T02:20:00Z",
"trace_id": "f1ed5c99-1fc5-6fc9-1b48-3d230c470e44"
} | {
"account_age_days": 650,
"account_id": "ACCT-0175F618C34B",
"baseline_risk_score": 0.47,
"kyc_tier": "tier_3",
"session_entropy": 0.567
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 1196,
"timestamp": "2026-01-03T02:20:00Z",
"transaction_amount_usd": 16351.57
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.435,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 575453.59,
"financial_exposure_usd": 988825.79,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104483",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-04T02:43:00Z",
"trace_id": "5f84bb7a-2b8d-00a7-1332-7b2c02615ac3"
} | {
"account_age_days": 1509,
"account_id": "ACCT-8B2CBF880AA2",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_2",
"session_entropy": 0.482
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 361,
"timestamp": "2026-01-04T00:14:00Z",
"transaction_amount_usd": 5.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4521175.75,
"financial_exposure_usd": 5560315.49,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105785",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "medium",
"timestamp": "2026-01-05T00:25:00Z",
"trace_id": "5ac4ee1c-0373-d82b-7092-6a9a260951c0"
} | {
"account_age_days": 474,
"account_id": "ACCT-7BB4ED0FFAFE",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_2",
"session_entropy": 0.856
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 405,
"timestamp": "2026-01-05T00:25:00Z",
"transaction_amount_usd": 2107632.24
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.598,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2232208.8,
"financial_exposure_usd": 3181377.2,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105469",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "high",
"timestamp": "2026-01-04T19:09:00Z",
"trace_id": "351084ba-e506-0130-bb20-242cc19e1f90"
} | {
"account_age_days": 896,
"account_id": "ACCT-B4BFF4AEFD9E",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_2",
"session_entropy": 0.506
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 253,
"timestamp": "2026-01-04T14:04:00Z",
"transaction_amount_usd": 10.76
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4689160.88,
"financial_exposure_usd": 5555051.24,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100951",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "high",
"timestamp": "2026-01-01T15:51:00Z",
"trace_id": "2c4622e9-4abf-3028-904f-ec88d9485610"
} | {
"account_age_days": 193,
"account_id": "ACCT-F6D6D025416D",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_1",
"session_entropy": 0.589
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 293,
"timestamp": "2026-01-01T07:34:00Z",
"transaction_amount_usd": 7.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.772,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 191069,
"financial_exposure_usd": 300517.23,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107420",
"label": "benign",
"label_confidence": 0.71,
"severity": "high",
"timestamp": "2026-01-06T03:40:00Z",
"trace_id": "a490b322-7c32-22dc-d260-45eb160fb3d4"
} | {
"account_age_days": 1460,
"account_id": "ACCT-7F4D123329B1",
"baseline_risk_score": 0.099,
"kyc_tier": "tier_2",
"session_entropy": 0.563
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 934,
"timestamp": "2026-01-06T03:40:00Z",
"transaction_amount_usd": 8085.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2476.58,
"financial_exposure_usd": 2711.38,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107713",
"label": "benign",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-06T08:33:00Z",
"trace_id": "6600d403-29bd-a1ef-c771-692ef11958aa"
} | {
"account_age_days": 1987,
"account_id": "ACCT-44F99F6D2FDC",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_2",
"session_entropy": 0.506
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 464,
"timestamp": "2026-01-06T08:33:00Z",
"transaction_amount_usd": 10408.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1370.53,
"financial_exposure_usd": 2455.61,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106426",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-05T11:06:00Z",
"trace_id": "05712263-43a5-28ff-f2b1-dfb10fe8b64c"
} | {
"account_age_days": 840,
"account_id": "ACCT-54B68B0F5AA1",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.766
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 478,
"timestamp": "2026-01-05T11:06:00Z",
"transaction_amount_usd": 967798.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.883,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3086730.76,
"financial_exposure_usd": 3173507.64,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109642",
"label": "benign",
"label_confidence": 0.61,
"severity": "critical",
"timestamp": "2026-01-07T16:42:00Z",
"trace_id": "08f4afa0-ea9d-0da0-d7be-6c23ef5e7ef9"
} | {
"account_age_days": 621,
"account_id": "ACCT-168324570943",
"baseline_risk_score": 0.155,
"kyc_tier": "tier_3",
"session_entropy": 0.889
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 922,
"timestamp": "2026-01-07T16:42:00Z",
"transaction_amount_usd": 4946.56
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.797,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 467.28,
"financial_exposure_usd": 1110.98,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103288",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "critical",
"timestamp": "2026-01-03T06:48:00Z",
"trace_id": "6c3511d0-bfc8-8d71-afa0-fa84cf57ea0b"
} | {
"account_age_days": 263,
"account_id": "ACCT-6437AD2066CA",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_3",
"session_entropy": 0.33
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 222,
"timestamp": "2026-01-02T22:47:00Z",
"transaction_amount_usd": 2.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.773,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 332662.21,
"financial_exposure_usd": 824909,
"recoverable_pct": 0.266
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108958",
"label": "benign",
"label_confidence": 0.62,
"severity": "medium",
"timestamp": "2026-01-07T05:18:00Z",
"trace_id": "be85da72-0cae-b67b-6c5c-074507bc6344"
} | {
"account_age_days": 282,
"account_id": "ACCT-1D695478602F",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_1",
"session_entropy": 0.409
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 667,
"timestamp": "2026-01-07T05:18:00Z",
"transaction_amount_usd": 11243.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5349.41,
"financial_exposure_usd": 6146.65,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100289",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "medium",
"timestamp": "2026-01-01T04:49:00Z",
"trace_id": "6f4b3d1a-a159-2b44-d781-27e8cb3394d7"
} | {
"account_age_days": 627,
"account_id": "ACCT-DB55667B3AA7",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_1",
"session_entropy": 0.575
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 617,
"timestamp": "2026-01-01T04:49:00Z",
"transaction_amount_usd": 31363.34
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1272153.63,
"financial_exposure_usd": 1363381.32,
"recoverable_pct": 0.061
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101991",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "medium",
"timestamp": "2026-01-02T09:11:00Z",
"trace_id": "810a22f8-81b1-7a06-dd47-3cf424c1c152"
} | {
"account_age_days": 1862,
"account_id": "ACCT-BC4A58C3EC23",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_3",
"session_entropy": 0.593
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 751,
"timestamp": "2026-01-02T09:11:00Z",
"transaction_amount_usd": 103169.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 173998.64,
"financial_exposure_usd": 314987.59,
"recoverable_pct": 0.049
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109904",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T21:04:00Z",
"trace_id": "f12fa52c-369d-1c56-5875-eb05ead00a49"
} | {
"account_age_days": 1791,
"account_id": "ACCT-BB00FF80C6CC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.807
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 368,
"timestamp": "2026-01-07T17:57:00Z",
"transaction_amount_usd": 0.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.742,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1125.05,
"financial_exposure_usd": 1188.8,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105835",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "high",
"timestamp": "2026-01-05T01:15:00Z",
"trace_id": "8e24eaa6-1caf-7ddd-fe62-997931fdc6c4"
} | {
"account_age_days": 734,
"account_id": "ACCT-D55F03E295BD",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.437
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 324,
"timestamp": "2026-01-04T17:12:00Z",
"transaction_amount_usd": 15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.737,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1551252.18,
"financial_exposure_usd": 2488000.65,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102029",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-02T09:49:00Z",
"trace_id": "fd4b41b3-d4d8-0fea-2c8c-96d2f4b7062b"
} | {
"account_age_days": 769,
"account_id": "ACCT-2AAD0E89F24D",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_3",
"session_entropy": 0.256
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 456,
"timestamp": "2026-01-02T09:49:00Z",
"transaction_amount_usd": 27914.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.596,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 169778.63,
"financial_exposure_usd": 362772.67,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100139",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "critical",
"timestamp": "2026-01-01T02:19:00Z",
"trace_id": "89534e15-2ea3-7b78-e466-c9376da7c95b"
} | {
"account_age_days": 1438,
"account_id": "ACCT-C86022C4B4DA",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_3",
"session_entropy": 0.788
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 302,
"timestamp": "2025-12-31T21:16:00Z",
"transaction_amount_usd": 4.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.717,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 312885.53,
"financial_exposure_usd": 314290.09,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107960",
"label": "benign",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-06T12:40:00Z",
"trace_id": "6bdab5c3-865a-f104-ab54-1fde8809ba73"
} | {
"account_age_days": 761,
"account_id": "ACCT-FC4CE5161DC7",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_2",
"session_entropy": 0.745
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 260,
"timestamp": "2026-01-06T10:46:00Z",
"transaction_amount_usd": 10.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2283.57,
"financial_exposure_usd": 2758.51,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106355",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-05T09:55:00Z",
"trace_id": "3aa5ad57-14b5-0638-cf30-4864479ebcb8"
} | {
"account_age_days": 587,
"account_id": "ACCT-0595F7904F9D",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_1",
"session_entropy": 0.514
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 638,
"timestamp": "2026-01-05T09:55:00Z",
"transaction_amount_usd": 1809636.38
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3782811.55,
"financial_exposure_usd": 7458174.65,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101884",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "critical",
"timestamp": "2026-01-02T07:24:00Z",
"trace_id": "9188429b-ef3c-b4e4-2e06-a2d0ea5c2c83"
} | {
"account_age_days": 1746,
"account_id": "ACCT-2C70FED0381A",
"baseline_risk_score": 0.465,
"kyc_tier": "tier_2",
"session_entropy": 0.309
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 709,
"timestamp": "2026-01-02T07:24:00Z",
"transaction_amount_usd": 51477.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 246152.74,
"financial_exposure_usd": 539374.45,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107860",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-06T11:00:00Z",
"trace_id": "fec7d653-a624-454d-8967-65da9dd1e70f"
} | {
"account_age_days": 1487,
"account_id": "ACCT-DC73346CC97F",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_1",
"session_entropy": 0.794
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 546,
"timestamp": "2026-01-06T11:00:00Z",
"transaction_amount_usd": 13154.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1286.39,
"financial_exposure_usd": 1508.89,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108006",
"label": "benign",
"label_confidence": 0.524,
"severity": "medium",
"timestamp": "2026-01-06T13:26:00Z",
"trace_id": "b3efda79-1e43-a089-81b1-e75e4489fc3d"
} | {
"account_age_days": 1500,
"account_id": "ACCT-A382CF4FDC47",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_2",
"session_entropy": 0.393
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 354,
"timestamp": "2026-01-06T12:32:00Z",
"transaction_amount_usd": 20.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1489.6,
"financial_exposure_usd": 1580.09,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102962",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-03T01:22:00Z",
"trace_id": "03798917-8595-37b9-9152-8071053d48dc"
} | {
"account_age_days": 711,
"account_id": "ACCT-BA236D201463",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_2",
"session_entropy": 0.319
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 1040,
"timestamp": "2026-01-03T01:22:00Z",
"transaction_amount_usd": 85332.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 188987.88,
"financial_exposure_usd": 375139.13,
"recoverable_pct": 0.047
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103250",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-03T06:10:00Z",
"trace_id": "06685fed-9966-c40a-bb4e-f4ae811ca035"
} | {
"account_age_days": 1155,
"account_id": "ACCT-2DCFCEF50C0C",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_3",
"session_entropy": 0.684
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 187,
"timestamp": "2026-01-03T04:14:00Z",
"transaction_amount_usd": 4.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.81,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 363669.91,
"financial_exposure_usd": 869549.25,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102334",
"label": "fraudulent",
"label_confidence": 0.755,
"severity": "medium",
"timestamp": "2026-01-02T14:54:00Z",
"trace_id": "5183f291-d04d-f489-8c13-bfd5968f226d"
} | {
"account_age_days": 474,
"account_id": "ACCT-D5D7CDE2529E",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_2",
"session_entropy": 0.624
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1139,
"timestamp": "2026-01-02T14:54:00Z",
"transaction_amount_usd": 95121.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.749,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 146659.63,
"financial_exposure_usd": 291736.39,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105084",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "high",
"timestamp": "2026-01-04T12:44:00Z",
"trace_id": "d03b2189-c703-095e-e46d-ad69c038d865"
} | {
"account_age_days": 1870,
"account_id": "ACCT-9FC8B48B5BA6",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_2",
"session_entropy": 0.483
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 379,
"timestamp": "2026-01-04T12:44:00Z",
"transaction_amount_usd": 2257261.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.646,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2942627.41,
"financial_exposure_usd": 4692578.23,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101932",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "high",
"timestamp": "2026-01-02T08:12:00Z",
"trace_id": "a95b4f46-17c9-8d26-9509-d4de0bd36424"
} | {
"account_age_days": 336,
"account_id": "ACCT-3D2A7C8A6695",
"baseline_risk_score": 0.587,
"kyc_tier": "tier_1",
"session_entropy": 0.361
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 953,
"timestamp": "2026-01-02T08:12:00Z",
"transaction_amount_usd": 21157.59
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.653,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 370149.66,
"financial_exposure_usd": 520926.23,
"recoverable_pct": 0.005
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106938",
"label": "benign",
"label_confidence": 0.57,
"severity": "critical",
"timestamp": "2026-01-05T19:38:00Z",
"trace_id": "cdc483c7-e302-325c-ba04-64bc2a48183f"
} | {
"account_age_days": 118,
"account_id": "ACCT-642998228187",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.343
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 247,
"timestamp": "2026-01-05T10:00:00Z",
"transaction_amount_usd": 3.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1152.91,
"financial_exposure_usd": 2255.81,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103293",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-03T06:53:00Z",
"trace_id": "7b876743-a9b9-2311-a3e2-279084b65708"
} | {
"account_age_days": 1077,
"account_id": "ACCT-5C29E4DBA475",
"baseline_risk_score": 0.625,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 925,
"timestamp": "2026-01-03T06:53:00Z",
"transaction_amount_usd": 10025.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.799,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 378079.9,
"financial_exposure_usd": 827809.49,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104817",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "high",
"timestamp": "2026-01-04T08:17:00Z",
"trace_id": "572265a6-e0dd-c92f-449e-156b1e601330"
} | {
"account_age_days": 1263,
"account_id": "ACCT-F00B2F7B2C34",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_2",
"session_entropy": 0.812
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1098,
"timestamp": "2026-01-04T08:17:00Z",
"transaction_amount_usd": 431134.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.872,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1444618.45,
"financial_exposure_usd": 2836223.01,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102189",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-02T12:29:00Z",
"trace_id": "64500e9f-8070-9dc2-c18f-2986deda4502"
} | {
"account_age_days": 1968,
"account_id": "ACCT-54F8BD5339C1",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_2",
"session_entropy": 0.345
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 306,
"timestamp": "2026-01-02T12:29:00Z",
"transaction_amount_usd": 13064.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.809,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 294191.34,
"financial_exposure_usd": 550238.95,
"recoverable_pct": 0.002
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102319",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "medium",
"timestamp": "2026-01-02T14:39:00Z",
"trace_id": "4ca97362-b0a0-f449-d207-301df941b281"
} | {
"account_age_days": 587,
"account_id": "ACCT-AF809C35A862",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_3",
"session_entropy": 0.629
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 954,
"timestamp": "2026-01-02T14:39:00Z",
"transaction_amount_usd": 100044.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.727,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 548448.27,
"financial_exposure_usd": 929125.12,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107023",
"label": "benign",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-05T21:03:00Z",
"trace_id": "0a094161-57ac-a29f-9bbd-01c1f5d62164"
} | {
"account_age_days": 1956,
"account_id": "ACCT-6A2F28F8EDAB",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_3",
"session_entropy": 0.296
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 926,
"timestamp": "2026-01-05T21:03:00Z",
"transaction_amount_usd": 10932.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3499.62,
"financial_exposure_usd": 6067.81,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102186",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "critical",
"timestamp": "2026-01-02T12:26:00Z",
"trace_id": "da7a3179-1e10-7058-0f74-92fbba1b3b1a"
} | {
"account_age_days": 711,
"account_id": "ACCT-FABF0B728BBE",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_1",
"session_entropy": 0.51
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 103,
"timestamp": "2026-01-02T09:26:00Z",
"transaction_amount_usd": 11.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.485,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 721975.31,
"financial_exposure_usd": 925038.67,
"recoverable_pct": 0.414
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103632",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "high",
"timestamp": "2026-01-03T12:32:00Z",
"trace_id": "e3390f0a-ee48-226f-f8f6-e23695d4d72e"
} | {
"account_age_days": 349,
"account_id": "ACCT-44202F5BB3A0",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 706,
"timestamp": "2026-01-03T12:32:00Z",
"transaction_amount_usd": 376077.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.903,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4068834,
"financial_exposure_usd": 5491154,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105330",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-04T16:50:00Z",
"trace_id": "a6a58aab-c60e-dcbb-b278-83463325b18e"
} | {
"account_age_days": 1514,
"account_id": "ACCT-893FFA539CE0",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_2",
"session_entropy": 0.475
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 264,
"timestamp": "2026-01-04T13:47:00Z",
"transaction_amount_usd": 10.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.624,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3450057.77,
"financial_exposure_usd": 3834375.15,
"recoverable_pct": 0.884
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101149",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "high",
"timestamp": "2026-01-01T19:09:00Z",
"trace_id": "59f1edb5-37d2-f891-3d6d-56675c9dc7fb"
} | {
"account_age_days": 1083,
"account_id": "ACCT-BD6E9D590D83",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_3",
"session_entropy": 0.181
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 579,
"timestamp": "2026-01-01T19:09:00Z",
"transaction_amount_usd": 31305.97
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.603,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 411540.7,
"financial_exposure_usd": 414579,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100488",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-01T08:08:00Z",
"trace_id": "1763be41-4786-4f3d-f07f-79b0a14e4b5f"
} | {
"account_age_days": 91,
"account_id": "ACCT-D0B6BA753ED9",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_3",
"session_entropy": 0.324
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 485,
"timestamp": "2026-01-01T08:08:00Z",
"transaction_amount_usd": 95497.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 516518.14,
"financial_exposure_usd": 735761.6,
"recoverable_pct": 0.336
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104802",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-04T08:02:00Z",
"trace_id": "b0db64b5-2128-b3ba-df12-212a3edd93f9"
} | {
"account_age_days": 1122,
"account_id": "ACCT-871161492BF7",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.548
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 167,
"timestamp": "2026-01-04T05:28:00Z",
"transaction_amount_usd": 12.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.762,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 877124.53,
"financial_exposure_usd": 1928928.09,
"recoverable_pct": 0.428
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109822",
"label": "benign",
"label_confidence": 0.575,
"severity": "medium",
"timestamp": "2026-01-07T19:42:00Z",
"trace_id": "91042088-8d4b-cd39-7a99-e1edec4bdcac"
} | {
"account_age_days": 201,
"account_id": "ACCT-F968FE24E9BB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.495
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 263,
"timestamp": "2026-01-07T19:42:00Z",
"transaction_amount_usd": 6934.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.453,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3213.21,
"financial_exposure_usd": 3987.25,
"recoverable_pct": 0.886
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104710",
"label": "fraudulent",
"label_confidence": 0.618,
"severity": "medium",
"timestamp": "2026-01-04T06:30:00Z",
"trace_id": "5bc054f3-d001-79b8-0df0-7873058fbc94"
} | {
"account_age_days": 1409,
"account_id": "ACCT-28046123155F",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_2",
"session_entropy": 0.125
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 267,
"timestamp": "2026-01-04T03:25:00Z",
"transaction_amount_usd": 10.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3404325.73,
"financial_exposure_usd": 4362625.83,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108559",
"label": "benign",
"label_confidence": 0.602,
"severity": "critical",
"timestamp": "2026-01-06T22:39:00Z",
"trace_id": "037a1b8c-47bf-a2e3-c611-8b256b2dde02"
} | {
"account_age_days": 1942,
"account_id": "ACCT-17F7EFEAA86B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.755
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 324,
"timestamp": "2026-01-06T14:08:00Z",
"transaction_amount_usd": 11.07
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.518,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2465.95,
"financial_exposure_usd": 5432.03,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104679",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-04T05:59:00Z",
"trace_id": "50c55d8d-2b22-be6b-6ae3-dc2d186a572c"
} | {
"account_age_days": 300,
"account_id": "ACCT-15F64209C8AB",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_1",
"session_entropy": 0.601
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 409,
"timestamp": "2026-01-04T05:59:00Z",
"transaction_amount_usd": 331513.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2304542.09,
"financial_exposure_usd": 4564631.55,
"recoverable_pct": 0.948
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104045",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "low",
"timestamp": "2026-01-03T19:25:00Z",
"trace_id": "f3d8c607-05fa-7098-7746-466446657898"
} | {
"account_age_days": 532,
"account_id": "ACCT-5138BEBF13DB",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.695
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 711,
"timestamp": "2026-01-03T19:25:00Z",
"transaction_amount_usd": 2853346.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.86,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 7512698.19,
"financial_exposure_usd": 7566492.91,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101787",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-02T05:47:00Z",
"trace_id": "2e7a75fc-1848-8462-a719-a5c3e85604c7"
} | {
"account_age_days": 1403,
"account_id": "ACCT-3BB9A44F634F",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_1",
"session_entropy": 0.287
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 512,
"timestamp": "2026-01-02T05:47:00Z",
"transaction_amount_usd": 74295.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.592,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 260503.16,
"financial_exposure_usd": 295421.75,
"recoverable_pct": 0.289
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101430",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-01T23:50:00Z",
"trace_id": "b6912c55-1180-a2a4-6716-36444c27d121"
} | {
"account_age_days": 1750,
"account_id": "ACCT-1243C604FEF8",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.561
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 460,
"timestamp": "2026-01-01T23:50:00Z",
"transaction_amount_usd": 41448.36
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.814,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1010207.74,
"financial_exposure_usd": 1058097.5,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104105",
"label": "fraudulent",
"label_confidence": 0.65,
"severity": "medium",
"timestamp": "2026-01-03T20:25:00Z",
"trace_id": "1e2af8be-28b1-8b01-1db0-bddc4655301b"
} | {
"account_age_days": 1398,
"account_id": "ACCT-9D7E3FA44475",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 831,
"timestamp": "2026-01-03T20:25:00Z",
"transaction_amount_usd": 2735949.7
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.63,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3372156.26,
"financial_exposure_usd": 3882161.53,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104874",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "high",
"timestamp": "2026-01-04T09:14:00Z",
"trace_id": "e95de58c-4393-7a3f-3e19-003de9b34186"
} | {
"account_age_days": 265,
"account_id": "ACCT-01CDA941BC77",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 280,
"timestamp": "2026-01-04T07:09:00Z",
"transaction_amount_usd": 15.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.379,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2278229.23,
"financial_exposure_usd": 4701862.34,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108909",
"label": "benign",
"label_confidence": 0.579,
"severity": "low",
"timestamp": "2026-01-07T04:29:00Z",
"trace_id": "f1c62009-5b45-a4b1-4609-b44fd88bcf30"
} | {
"account_age_days": 870,
"account_id": "ACCT-150EFF3EB8E3",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_2",
"session_entropy": 0.354
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 281,
"timestamp": "2026-01-07T03:30:00Z",
"transaction_amount_usd": 15.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 574.81,
"financial_exposure_usd": 1370.08,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107425",
"label": "benign",
"label_confidence": 0.661,
"severity": "low",
"timestamp": "2026-01-06T03:45:00Z",
"trace_id": "057ffb5b-81cb-16fe-00c9-a04aca741d49"
} | {
"account_age_days": 1909,
"account_id": "ACCT-B6B568DCBDDE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.693
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 398,
"timestamp": "2026-01-06T03:45:00Z",
"transaction_amount_usd": 6672.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2908.69,
"financial_exposure_usd": 4812.87,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107966",
"label": "benign",
"label_confidence": 0.742,
"severity": "medium",
"timestamp": "2026-01-06T12:46:00Z",
"trace_id": "cd8e475c-eee8-81eb-2ce7-6b6466995b20"
} | {
"account_age_days": 1402,
"account_id": "ACCT-06DC275210FC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.915
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1076,
"timestamp": "2026-01-06T12:46:00Z",
"transaction_amount_usd": 11007.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2474.53,
"financial_exposure_usd": 3604.43,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109456",
"label": "benign",
"label_confidence": 0.485,
"severity": "medium",
"timestamp": "2026-01-07T13:36:00Z",
"trace_id": "2d2b2eef-614f-eec4-dcff-61cac5f70157"
} | {
"account_age_days": 706,
"account_id": "ACCT-A916E012F357",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_3",
"session_entropy": 0.611
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 488,
"timestamp": "2026-01-07T13:36:00Z",
"transaction_amount_usd": 11112.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1263.86,
"financial_exposure_usd": 1869.95,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109255",
"label": "benign",
"label_confidence": 0.515,
"severity": "high",
"timestamp": "2026-01-07T10:15:00Z",
"trace_id": "1e7b9ff9-aa9b-73c0-cc69-af0155ea5d08"
} | {
"account_age_days": 1276,
"account_id": "ACCT-3F47D6749C20",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.939
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 186,
"timestamp": "2026-01-07T04:05:00Z",
"transaction_amount_usd": 17.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 704.15,
"financial_exposure_usd": 732.12,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102990",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-03T01:50:00Z",
"trace_id": "f2db6049-52e1-e9ee-572b-ea1d25a2e71c"
} | {
"account_age_days": 1864,
"account_id": "ACCT-7249240C2F47",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_3",
"session_entropy": 0.805
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 92,
"timestamp": "2026-01-02T22:29:00Z",
"transaction_amount_usd": 19.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.712,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 405131.61,
"financial_exposure_usd": 424343.29,
"recoverable_pct": 0.246
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103169",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "critical",
"timestamp": "2026-01-03T04:49:00Z",
"trace_id": "52198b51-0fcf-a9bd-36d0-87db9681e239"
} | {
"account_age_days": 232,
"account_id": "ACCT-B06FF2715B0C",
"baseline_risk_score": 0.535,
"kyc_tier": "tier_3",
"session_entropy": 0.662
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 669,
"timestamp": "2026-01-03T04:49:00Z",
"transaction_amount_usd": 52799.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.777,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 714736.35,
"financial_exposure_usd": 947633.99,
"recoverable_pct": 0.085
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105206",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-04T14:46:00Z",
"trace_id": "464b1ae7-c576-6bef-e699-d00ac427c827"
} | {
"account_age_days": 51,
"account_id": "ACCT-8E8ED5326D25",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.942
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1038,
"timestamp": "2026-01-04T14:46:00Z",
"transaction_amount_usd": 2351634.47
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.829,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1909835.86,
"financial_exposure_usd": 2584715.42,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105073",
"label": "fraudulent",
"label_confidence": 0.659,
"severity": "medium",
"timestamp": "2026-01-04T12:33:00Z",
"trace_id": "9064975a-d39a-9402-1e6b-c6ee8951fb5e"
} | {
"account_age_days": 984,
"account_id": "ACCT-E5489CFCBBF9",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 186,
"timestamp": "2026-01-04T08:39:00Z",
"transaction_amount_usd": 2.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.943,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4277314.44,
"financial_exposure_usd": 5326992.86,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106799",
"label": "benign",
"label_confidence": 0.678,
"severity": "low",
"timestamp": "2026-01-05T17:19:00Z",
"trace_id": "0d29dff1-ac83-f5ab-5cfe-8473a7d58502"
} | {
"account_age_days": 398,
"account_id": "ACCT-F34BBBC94A9E",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.445
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 161,
"timestamp": "2026-01-05T17:19:00Z",
"transaction_amount_usd": 11749.96
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2632.71,
"financial_exposure_usd": 3910.58,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108067",
"label": "benign",
"label_confidence": 0.724,
"severity": "low",
"timestamp": "2026-01-06T14:27:00Z",
"trace_id": "1050f828-58fd-7cfb-2337-50ebd4d17c4b"
} | {
"account_age_days": 1104,
"account_id": "ACCT-5EAD8E2A09F0",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.698
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 111,
"timestamp": "2026-01-06T02:46:00Z",
"transaction_amount_usd": 6.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1677.31,
"financial_exposure_usd": 2167.89,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107371",
"label": "benign",
"label_confidence": 0.515,
"severity": "medium",
"timestamp": "2026-01-06T02:51:00Z",
"trace_id": "32f97c2d-2fbc-10d4-a79a-47efeeb5ee63"
} | {
"account_age_days": 1315,
"account_id": "ACCT-A6CDDD59D3BB",
"baseline_risk_score": 0.053,
"kyc_tier": "tier_1",
"session_entropy": 0.614
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 311,
"timestamp": "2026-01-06T02:51:00Z",
"transaction_amount_usd": 11214.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.509,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3122.99,
"financial_exposure_usd": 4133.27,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107183",
"label": "benign",
"label_confidence": 0.495,
"severity": "high",
"timestamp": "2026-01-05T23:43:00Z",
"trace_id": "c52db4dd-3c94-f10f-a004-b77d0ca12e23"
} | {
"account_age_days": 947,
"account_id": "ACCT-1B9076A96607",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_1",
"session_entropy": 0.74
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 99,
"timestamp": "2026-01-05T22:04:00Z",
"transaction_amount_usd": 16.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.451,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 548.96,
"financial_exposure_usd": 770.48,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100069",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "critical",
"timestamp": "2026-01-01T01:09:00Z",
"trace_id": "c3a58237-01b2-16cf-9d23-c3cf7e1f48c4"
} | {
"account_age_days": 1756,
"account_id": "ACCT-3C5DBA42CDD8",
"baseline_risk_score": 0.524,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 642,
"timestamp": "2026-01-01T01:09:00Z",
"transaction_amount_usd": 101837.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.438,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 541411.43,
"financial_exposure_usd": 791777.71,
"recoverable_pct": 0.008
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108714",
"label": "benign",
"label_confidence": 0.665,
"severity": "low",
"timestamp": "2026-01-07T01:14:00Z",
"trace_id": "206e4e65-6578-00ae-f9b3-7aac0c68165b"
} | {
"account_age_days": 1764,
"account_id": "ACCT-26F513EB7511",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.441
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 416,
"timestamp": "2026-01-07T01:14:00Z",
"transaction_amount_usd": 11991.06
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 536.29,
"financial_exposure_usd": 909.38,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105474",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "critical",
"timestamp": "2026-01-04T19:14:00Z",
"trace_id": "9691c1d9-407d-87c6-5810-bf3fb4fdc534"
} | {
"account_age_days": 1634,
"account_id": "ACCT-C86EC1FAD1BF",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 169,
"timestamp": "2026-01-04T19:14:00Z",
"transaction_amount_usd": 2939132.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.624,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4531241.4,
"financial_exposure_usd": 4619398.98,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105042",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "medium",
"timestamp": "2026-01-04T12:02:00Z",
"trace_id": "8021d852-ad2f-1ff9-8163-f5d83f44e3ec"
} | {
"account_age_days": 293,
"account_id": "ACCT-5FB1F8D7175D",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_1",
"session_entropy": 0.341
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 92,
"timestamp": "2026-01-04T12:02:00Z",
"transaction_amount_usd": 2109959.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2279543.01,
"financial_exposure_usd": 3745918.18,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101217",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "high",
"timestamp": "2026-01-01T20:17:00Z",
"trace_id": "5178ea42-4301-b664-e4b5-88793acd55f3"
} | {
"account_age_days": 861,
"account_id": "ACCT-7F31DEADC466",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.856
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 126,
"timestamp": "2026-01-01T17:52:00Z",
"transaction_amount_usd": 20.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.503,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 565428.41,
"financial_exposure_usd": 570512.2,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102677",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "high",
"timestamp": "2026-01-02T20:37:00Z",
"trace_id": "522a1264-ca21-a27c-cbc6-7d90c8f127d7"
} | {
"account_age_days": 1830,
"account_id": "ACCT-BF9D214261AB",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_1",
"session_entropy": 0.539
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 831,
"timestamp": "2026-01-02T20:37:00Z",
"transaction_amount_usd": 115256.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.546,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 755398.69,
"financial_exposure_usd": 1268365.53,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106122",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "high",
"timestamp": "2026-01-05T06:02:00Z",
"trace_id": "1d5409b2-f3bf-404b-84f3-44e67df3f044"
} | {
"account_age_days": 1570,
"account_id": "ACCT-DE8D2CF6EF82",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.309
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 244,
"timestamp": "2026-01-05T06:02:00Z",
"transaction_amount_usd": 1704487.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.763,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2691761.84,
"financial_exposure_usd": 3730970.56,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106517",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-05T12:37:00Z",
"trace_id": "068068a6-0d65-539b-86ea-1c18c3730b7e"
} | {
"account_age_days": 1501,
"account_id": "ACCT-3E9ECC60B06D",
"baseline_risk_score": 0.238,
"kyc_tier": "tier_1",
"session_entropy": 0.364
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 495,
"timestamp": "2026-01-05T12:37:00Z",
"transaction_amount_usd": 1905202.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.623,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3378647.26,
"financial_exposure_usd": 3790826.6,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105346",
"label": "fraudulent",
"label_confidence": 0.731,
"severity": "medium",
"timestamp": "2026-01-04T17:06:00Z",
"trace_id": "87633f87-53e0-e12f-fa06-84b9bb701031"
} | {
"account_age_days": 1659,
"account_id": "ACCT-CEF2A04015EF",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_1",
"session_entropy": 0.736
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 159,
"timestamp": "2026-01-04T05:29:00Z",
"transaction_amount_usd": 0.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.646,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5685583.56,
"financial_exposure_usd": 6603596.51,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102854",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "medium",
"timestamp": "2026-01-02T23:34:00Z",
"trace_id": "3f6f0408-af95-90f2-7afe-200e2bdbfce1"
} | {
"account_age_days": 1882,
"account_id": "ACCT-00AF1797DDF7",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1167,
"timestamp": "2026-01-02T23:34:00Z",
"transaction_amount_usd": 40635.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.357,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 589415.66,
"financial_exposure_usd": 669305.48,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107756",
"label": "benign",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-06T09:16:00Z",
"trace_id": "7e7d2458-46f2-dc00-be87-d38f505458c5"
} | {
"account_age_days": 1370,
"account_id": "ACCT-B896B246905E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.431
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 742,
"timestamp": "2026-01-06T09:16:00Z",
"transaction_amount_usd": 10081.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.56,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 279.96,
"financial_exposure_usd": 457.98,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105127",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-04T13:27:00Z",
"trace_id": "b0909fa8-b428-08c7-a804-da358c1fd806"
} | {
"account_age_days": 834,
"account_id": "ACCT-7C1EB2CCFF3E",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_1",
"session_entropy": 0.466
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 503,
"timestamp": "2026-01-04T13:27:00Z",
"transaction_amount_usd": 471038.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.36,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2885919.68,
"financial_exposure_usd": 4858532.9,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105421",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-04T18:21:00Z",
"trace_id": "f0d3570a-c5fd-274f-45e8-924dd7bd1f9d"
} | {
"account_age_days": 1756,
"account_id": "ACCT-DB9DBFB70EC2",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_3",
"session_entropy": 0.167
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 161,
"timestamp": "2026-01-04T18:21:00Z",
"transaction_amount_usd": 2120214.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.655,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1122163.84,
"financial_exposure_usd": 1810170.95,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101929",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-02T08:09:00Z",
"trace_id": "dcd7a8fe-6f2f-43a5-9463-82692314b234"
} | {
"account_age_days": 806,
"account_id": "ACCT-D0FB2C709EE5",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_2",
"session_entropy": 0.783
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 976,
"timestamp": "2026-01-02T08:09:00Z",
"transaction_amount_usd": 7698.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.582,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 287929.17,
"financial_exposure_usd": 421498.4,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107011",
"label": "benign",
"label_confidence": 0.468,
"severity": "low",
"timestamp": "2026-01-05T20:51:00Z",
"trace_id": "e09b3f7a-8bb5-0d77-c644-44cad2fca9ab"
} | {
"account_age_days": 955,
"account_id": "ACCT-9D14BA165961",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_1",
"session_entropy": 0.129
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 266,
"timestamp": "2026-01-05T11:41:00Z",
"transaction_amount_usd": 22.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 676.89,
"financial_exposure_usd": 867.43,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107229",
"label": "benign",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-06T00:29:00Z",
"trace_id": "79df1c3c-0ccf-67e5-d820-7083ed6fc3b2"
} | {
"account_age_days": 1888,
"account_id": "ACCT-92BCF3DB8CD4",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.932
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 784,
"timestamp": "2026-01-06T00:29:00Z",
"transaction_amount_usd": 14449.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.513,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 925.24,
"financial_exposure_usd": 1661.55,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107773",
"label": "benign",
"label_confidence": 0.719,
"severity": "high",
"timestamp": "2026-01-06T09:33:00Z",
"trace_id": "b676b799-265e-12f8-b227-3c886459b927"
} | {
"account_age_days": 1556,
"account_id": "ACCT-E4F7E4009FAF",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1103,
"timestamp": "2026-01-06T09:33:00Z",
"transaction_amount_usd": 3561.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.629,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1039.95,
"financial_exposure_usd": 2227.7,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104455",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "critical",
"timestamp": "2026-01-04T02:15:00Z",
"trace_id": "a6e09c28-18ce-3fb1-f778-9fe5efb121b8"
} | {
"account_age_days": 247,
"account_id": "ACCT-874B9C21F835",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_1",
"session_entropy": 0.553
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 177,
"timestamp": "2026-01-03T13:51:00Z",
"transaction_amount_usd": 4.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.704,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1060358.16,
"financial_exposure_usd": 2548969.01,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102702",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-02T21:02:00Z",
"trace_id": "0079dcdf-3115-e234-967d-b27388dcc9a0"
} | {
"account_age_days": 1531,
"account_id": "ACCT-95D10DFD7895",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_3",
"session_entropy": 0.751
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 475,
"timestamp": "2026-01-02T21:02:00Z",
"transaction_amount_usd": 41480.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.613,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 635962.99,
"financial_exposure_usd": 1151650.99,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105774",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "high",
"timestamp": "2026-01-05T00:14:00Z",
"trace_id": "7ea6e4f8-3924-8f9a-4c1c-808d637fc050"
} | {
"account_age_days": 1637,
"account_id": "ACCT-99529708C151",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_3",
"session_entropy": 0.495
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1082,
"timestamp": "2026-01-05T00:14:00Z",
"transaction_amount_usd": 1009617.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.852,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7010022.95,
"financial_exposure_usd": 8267797.3,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106364",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "critical",
"timestamp": "2026-01-05T10:04:00Z",
"trace_id": "192b2cd5-6360-531b-15ae-6fdd0f2fc01f"
} | {
"account_age_days": 1520,
"account_id": "ACCT-BA40795FA753",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_3",
"session_entropy": 0.702
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 799,
"timestamp": "2026-01-05T10:04:00Z",
"transaction_amount_usd": 1721660
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.351,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6208617.13,
"financial_exposure_usd": 7830197.27,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101305",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "medium",
"timestamp": "2026-01-01T21:45:00Z",
"trace_id": "7dc55f44-d9f0-ade0-c344-49af36bc85e6"
} | {
"account_age_days": 1534,
"account_id": "ACCT-14E55E747BDC",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_2",
"session_entropy": 0.371
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 446,
"timestamp": "2026-01-01T21:45:00Z",
"transaction_amount_usd": 106421.98
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.551,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 514968.41,
"financial_exposure_usd": 1274161.82,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107278",
"label": "benign",
"label_confidence": 0.537,
"severity": "low",
"timestamp": "2026-01-06T01:18:00Z",
"trace_id": "f1d6d4df-44cf-bef4-98ca-a693c7deca6e"
} | {
"account_age_days": 851,
"account_id": "ACCT-4AB346D71345",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_1",
"session_entropy": 0.217
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1192,
"timestamp": "2026-01-06T01:18:00Z",
"transaction_amount_usd": 6294.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3183.29,
"financial_exposure_usd": 4350.49,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107466",
"label": "benign",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-06T04:26:00Z",
"trace_id": "0b7c5cd0-9619-67bf-e49c-fac6a784fb1e"
} | {
"account_age_days": 953,
"account_id": "ACCT-6986CB802ACD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.14
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 736,
"timestamp": "2026-01-06T04:26:00Z",
"transaction_amount_usd": 4601.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109877",
"label": "benign",
"label_confidence": 0.666,
"severity": "critical",
"timestamp": "2026-01-07T20:37:00Z",
"trace_id": "3f60104b-c715-0775-7e49-bb6ee623c9ee"
} | {
"account_age_days": 1704,
"account_id": "ACCT-E6229F36AA06",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.914
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 266,
"timestamp": "2026-01-07T17:08:00Z",
"transaction_amount_usd": 24.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1548.67,
"financial_exposure_usd": 3137.37,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106403",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "high",
"timestamp": "2026-01-05T10:43:00Z",
"trace_id": "73f972c1-5604-46d9-baf1-39565e9d407c"
} | {
"account_age_days": 227,
"account_id": "ACCT-C37A0A41C127",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_2",
"session_entropy": 0.157
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 225,
"timestamp": "2026-01-05T10:43:00Z",
"transaction_amount_usd": 50428.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.416,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5601562.69,
"financial_exposure_usd": 6344542.66,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107876",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-06T11:16:00Z",
"trace_id": "2863fce4-a45a-571d-297e-970d16ce70ec"
} | {
"account_age_days": 194,
"account_id": "ACCT-83525AE2ABA2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.101
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 100,
"timestamp": "2026-01-05T23:47:00Z",
"transaction_amount_usd": 17.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.522,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1505.69,
"financial_exposure_usd": 2261.15,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105790",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "medium",
"timestamp": "2026-01-05T00:30:00Z",
"trace_id": "7cec6b66-454d-8b8f-4c1f-ec23b3ad56bb"
} | {
"account_age_days": 1894,
"account_id": "ACCT-8EDBA40794FC",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.146
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1119,
"timestamp": "2026-01-05T00:30:00Z",
"transaction_amount_usd": 2868317.8
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4647363.12,
"financial_exposure_usd": 5385563.99,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.