schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102259",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-02T13:39:00Z",
"trace_id": "abbac6ea-1a43-8363-b7fb-01254b512960"
} | {
"account_age_days": 1142,
"account_id": "ACCT-FE49B09B2FBC",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_1",
"session_entropy": 0.385
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 232,
"timestamp": "2026-01-02T09:00:00Z",
"transaction_amount_usd": 20.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.396,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 749271.04,
"financial_exposure_usd": 772645.46,
"recoverable_pct": 0.393
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108589",
"label": "benign",
"label_confidence": 0.531,
"severity": "medium",
"timestamp": "2026-01-06T23:09:00Z",
"trace_id": "c851bc26-92e4-9162-3128-2b3963fe4faa"
} | {
"account_age_days": 1111,
"account_id": "ACCT-9A0A30FEB3BF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.65
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 84,
"timestamp": "2026-01-06T10:47:00Z",
"transaction_amount_usd": 21.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5044.02,
"financial_exposure_usd": 6704.4,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103080",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-03T03:20:00Z",
"trace_id": "0d60510f-5da8-c9f7-04a4-6fe210bfdba1"
} | {
"account_age_days": 1808,
"account_id": "ACCT-CF374878799B",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_3",
"session_entropy": 0.164
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 609,
"timestamp": "2026-01-03T03:20:00Z",
"transaction_amount_usd": 1322.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.481,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 676116.35,
"financial_exposure_usd": 1004955.24,
"recoverable_pct": 0.145
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100300",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "medium",
"timestamp": "2026-01-01T05:00:00Z",
"trace_id": "1a9e82f5-0228-de49-e4c4-e73c4c46bad8"
} | {
"account_age_days": 1081,
"account_id": "ACCT-47165E939CEB",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_1",
"session_entropy": 0.589
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 236,
"timestamp": "2025-12-31T18:10:00Z",
"transaction_amount_usd": 1.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 90538.08,
"financial_exposure_usd": 194064.42,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101869",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "high",
"timestamp": "2026-01-02T07:09:00Z",
"trace_id": "c3ec2030-b3d0-4331-6ddb-f6e3fe185f6d"
} | {
"account_age_days": 301,
"account_id": "ACCT-DD9DDB2008E6",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_3",
"session_entropy": 0.593
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1033,
"timestamp": "2026-01-02T07:09:00Z",
"transaction_amount_usd": 116344.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 440950.92,
"financial_exposure_usd": 880165.17,
"recoverable_pct": 0.002
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108849",
"label": "benign",
"label_confidence": 0.681,
"severity": "low",
"timestamp": "2026-01-07T03:29:00Z",
"trace_id": "d1950bb8-dd61-c334-15af-61f8f039ff36"
} | {
"account_age_days": 525,
"account_id": "ACCT-A73AFACB926F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.522
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 345,
"timestamp": "2026-01-06T20:04:00Z",
"transaction_amount_usd": 21.52
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1975.22,
"financial_exposure_usd": 2904.95,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100959",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "high",
"timestamp": "2026-01-01T15:59:00Z",
"trace_id": "705a346e-9c84-0576-27e6-71c399ab5b7e"
} | {
"account_age_days": 1304,
"account_id": "ACCT-59122D58E027",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_2",
"session_entropy": 0.687
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 734,
"timestamp": "2026-01-01T15:59:00Z",
"transaction_amount_usd": 22254.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 459150.36,
"financial_exposure_usd": 877775.83,
"recoverable_pct": 0.24
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107000",
"label": "benign",
"label_confidence": 0.63,
"severity": "medium",
"timestamp": "2026-01-05T20:40:00Z",
"trace_id": "d834b880-7c53-c17d-8b52-c085706c933e"
} | {
"account_age_days": 501,
"account_id": "ACCT-3FA861055CF1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.361
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 476,
"timestamp": "2026-01-05T20:40:00Z",
"transaction_amount_usd": 3654.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4809.26,
"financial_exposure_usd": 5988.42,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109181",
"label": "benign",
"label_confidence": 0.622,
"severity": "low",
"timestamp": "2026-01-07T09:01:00Z",
"trace_id": "601f5901-60d9-02c6-c333-2bf8402ed9a0"
} | {
"account_age_days": 1349,
"account_id": "ACCT-13FCB47E6D2C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.663
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 413,
"timestamp": "2026-01-07T09:01:00Z",
"transaction_amount_usd": 10582.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.451,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4761.78,
"financial_exposure_usd": 7729.54,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102204",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-02T12:44:00Z",
"trace_id": "9a641dd7-6093-258f-949c-44f8a77c419d"
} | {
"account_age_days": 382,
"account_id": "ACCT-8A3854AC49BC",
"baseline_risk_score": 0.403,
"kyc_tier": "tier_3",
"session_entropy": 0.457
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 130,
"timestamp": "2026-01-02T04:17:00Z",
"transaction_amount_usd": 21.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.697,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 506308.01,
"financial_exposure_usd": 648710.98,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108110",
"label": "benign",
"label_confidence": 0.482,
"severity": "low",
"timestamp": "2026-01-06T15:10:00Z",
"trace_id": "93d393b0-c425-e446-8975-fe1bf6b11b66"
} | {
"account_age_days": 1350,
"account_id": "ACCT-E3290B0460B6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.457
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1035,
"timestamp": "2026-01-06T15:10:00Z",
"transaction_amount_usd": 7968.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.515,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1188.52,
"financial_exposure_usd": 1728.51,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107173",
"label": "benign",
"label_confidence": 0.575,
"severity": "low",
"timestamp": "2026-01-05T23:33:00Z",
"trace_id": "8d62732e-4c85-118c-52d7-dde3eb390b29"
} | {
"account_age_days": 399,
"account_id": "ACCT-022D31D72EB2",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_3",
"session_entropy": 0.208
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 220,
"timestamp": "2026-01-05T17:09:00Z",
"transaction_amount_usd": 20.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1298.54,
"financial_exposure_usd": 1441.46,
"recoverable_pct": 0.673
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100827",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "medium",
"timestamp": "2026-01-01T13:47:00Z",
"trace_id": "b71aa854-7253-c3e9-3e21-fdb741ee3556"
} | {
"account_age_days": 1548,
"account_id": "ACCT-1C347D81D6F3",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_3",
"session_entropy": 0.418
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1181,
"timestamp": "2026-01-01T13:47:00Z",
"transaction_amount_usd": 57991.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.83,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 603864.73,
"financial_exposure_usd": 1146867.2,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102219",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-02T12:59:00Z",
"trace_id": "e76b4f6b-24af-053b-8953-cc01281fe4d8"
} | {
"account_age_days": 1101,
"account_id": "ACCT-C59A8F0B6D32",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_1",
"session_entropy": 0.512
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 188,
"timestamp": "2026-01-02T12:59:00Z",
"transaction_amount_usd": 64368.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.811,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 415867.51,
"financial_exposure_usd": 794989.77,
"recoverable_pct": 0.369
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106527",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "critical",
"timestamp": "2026-01-05T12:47:00Z",
"trace_id": "a38bcbdd-032a-1996-08a7-eeb952a65286"
} | {
"account_age_days": 1607,
"account_id": "ACCT-C9857661569A",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 469,
"timestamp": "2026-01-05T12:47:00Z",
"transaction_amount_usd": 1477009.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.366,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2710848.01,
"financial_exposure_usd": 4348579.48,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108140",
"label": "benign",
"label_confidence": 0.652,
"severity": "high",
"timestamp": "2026-01-06T15:40:00Z",
"trace_id": "8997f700-f5c6-de6c-26da-f67f321cec48"
} | {
"account_age_days": 207,
"account_id": "ACCT-FD7E6BED5C39",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.694
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 273,
"timestamp": "2026-01-06T15:40:00Z",
"transaction_amount_usd": 12525.75
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1059.99,
"financial_exposure_usd": 1216.32,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109391",
"label": "benign",
"label_confidence": 0.538,
"severity": "low",
"timestamp": "2026-01-07T12:31:00Z",
"trace_id": "8fc85d0a-cc6d-a24f-d6c2-9ab5fedb6781"
} | {
"account_age_days": 383,
"account_id": "ACCT-13F151888437",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_2",
"session_entropy": 0.685
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 82,
"timestamp": "2026-01-07T12:31:00Z",
"transaction_amount_usd": 4554.35
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.59,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 863.06,
"financial_exposure_usd": 1339.7,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107866",
"label": "benign",
"label_confidence": 0.681,
"severity": "low",
"timestamp": "2026-01-06T11:06:00Z",
"trace_id": "d6298068-ae1a-6e75-c977-e93bbaae57cf"
} | {
"account_age_days": 60,
"account_id": "ACCT-4650FBD72205",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.477
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 344,
"timestamp": "2026-01-06T11:06:00Z",
"transaction_amount_usd": 5123.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1880.63,
"financial_exposure_usd": 2061.98,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109227",
"label": "benign",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-07T09:47:00Z",
"trace_id": "8e03a5e4-5923-59d8-0aaf-d8b16bbebd68"
} | {
"account_age_days": 1363,
"account_id": "ACCT-6969E1D086FC",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_2",
"session_entropy": 0.892
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 260,
"timestamp": "2026-01-06T21:32:00Z",
"transaction_amount_usd": 8.61
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2501,
"financial_exposure_usd": 4293.85,
"recoverable_pct": 0.742
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104647",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "high",
"timestamp": "2026-01-04T05:27:00Z",
"trace_id": "5f264217-8724-111e-f392-a2195f2eb4e3"
} | {
"account_age_days": 1471,
"account_id": "ACCT-3F0B7FE7D542",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.921
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 276,
"timestamp": "2026-01-04T05:27:00Z",
"transaction_amount_usd": 2504690.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.751,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1198532.01,
"financial_exposure_usd": 2440685.49,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103373",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "low",
"timestamp": "2026-01-03T08:13:00Z",
"trace_id": "6e10100c-ac39-ac73-d828-c159737b76b9"
} | {
"account_age_days": 379,
"account_id": "ACCT-7D4F6A9CCB94",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_1",
"session_entropy": 0.113
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 422,
"timestamp": "2026-01-03T08:13:00Z",
"transaction_amount_usd": 498475.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 944736.89,
"financial_exposure_usd": 981717.79,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108410",
"label": "benign",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-06T20:10:00Z",
"trace_id": "d362b62b-0244-56d7-43b1-ce8d012ac82a"
} | {
"account_age_days": 1523,
"account_id": "ACCT-A585C8E3F5CA",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.831
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 259,
"timestamp": "2026-01-06T17:26:00Z",
"transaction_amount_usd": 2.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.777,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2376.9,
"financial_exposure_usd": 3485.31,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101242",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "low",
"timestamp": "2026-01-01T20:42:00Z",
"trace_id": "ecd0b2e6-07a3-3bd0-cb0d-acb06a4aef53"
} | {
"account_age_days": 800,
"account_id": "ACCT-444D1597AA5B",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_2",
"session_entropy": 0.67
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 218,
"timestamp": "2026-01-01T12:25:00Z",
"transaction_amount_usd": 13.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.607,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 228149.4,
"financial_exposure_usd": 256801.84,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102953",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "medium",
"timestamp": "2026-01-03T01:13:00Z",
"trace_id": "780f5153-14a7-7589-7b70-dcb1018aec2d"
} | {
"account_age_days": 1185,
"account_id": "ACCT-252ED1A72AD9",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_3",
"session_entropy": 0.392
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 204,
"timestamp": "2026-01-03T01:13:00Z",
"transaction_amount_usd": 61630.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 734378.94,
"financial_exposure_usd": 829352.31,
"recoverable_pct": 0.37
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107910",
"label": "benign",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-06T11:50:00Z",
"trace_id": "3170713e-57c8-890a-df48-dfdc50142b8c"
} | {
"account_age_days": 1647,
"account_id": "ACCT-B692DE026A74",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_3",
"session_entropy": 0.419
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 787,
"timestamp": "2026-01-06T11:50:00Z",
"transaction_amount_usd": 8686.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.542,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1662.04,
"financial_exposure_usd": 3724.4,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103396",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-03T08:36:00Z",
"trace_id": "3964e1a9-2ba2-eaf0-8b81-b9f36f73bb19"
} | {
"account_age_days": 768,
"account_id": "ACCT-23358B7CDC4C",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_3",
"session_entropy": 0.225
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 108,
"timestamp": "2026-01-03T02:22:00Z",
"transaction_amount_usd": 2.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.466,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3323646.9,
"financial_exposure_usd": 3749771.33,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107120",
"label": "benign",
"label_confidence": 0.524,
"severity": "low",
"timestamp": "2026-01-05T22:40:00Z",
"trace_id": "592a624b-5662-c95c-8b84-d47523bda447"
} | {
"account_age_days": 785,
"account_id": "ACCT-C5B2D54ADC3E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.13
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 585,
"timestamp": "2026-01-05T22:40:00Z",
"transaction_amount_usd": 2437.75
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.708,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 431.83,
"financial_exposure_usd": 515.01,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102890",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "critical",
"timestamp": "2026-01-03T00:10:00Z",
"trace_id": "c3f47183-47d9-4caf-73f2-85606cabab5c"
} | {
"account_age_days": 692,
"account_id": "ACCT-2B31B98E1DFE",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_2",
"session_entropy": 0.868
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 359,
"timestamp": "2026-01-03T00:10:00Z",
"transaction_amount_usd": 108459.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.648,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 348097.65,
"financial_exposure_usd": 770925.59,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105491",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "critical",
"timestamp": "2026-01-04T19:31:00Z",
"trace_id": "12058528-644c-8fdb-9eba-9116bcd1ca54"
} | {
"account_age_days": 1576,
"account_id": "ACCT-5B3D9BDC8603",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.863
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 764,
"timestamp": "2026-01-04T19:31:00Z",
"transaction_amount_usd": 292861.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7273448.84,
"financial_exposure_usd": 8971388.91,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107049",
"label": "benign",
"label_confidence": 0.67,
"severity": "medium",
"timestamp": "2026-01-05T21:29:00Z",
"trace_id": "aeb6b13c-70ae-762c-3951-f5fa382cd83a"
} | {
"account_age_days": 739,
"account_id": "ACCT-286B24388361",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.149
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 117,
"timestamp": "2026-01-05T21:29:00Z",
"transaction_amount_usd": 2109.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 392.8,
"financial_exposure_usd": 691.19,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104188",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "high",
"timestamp": "2026-01-03T21:48:00Z",
"trace_id": "4272b21f-c00e-b75f-e898-4ee109728afe"
} | {
"account_age_days": 332,
"account_id": "ACCT-327EDC8B0501",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_1",
"session_entropy": 0.32
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 322,
"timestamp": "2026-01-03T20:31:00Z",
"transaction_amount_usd": 23.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.775,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4073570.76,
"financial_exposure_usd": 5535907.19,
"recoverable_pct": 0.633
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103426",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "high",
"timestamp": "2026-01-03T09:06:00Z",
"trace_id": "4804e342-8640-f209-7d12-4e4fd550bfaf"
} | {
"account_age_days": 539,
"account_id": "ACCT-3995372501EE",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.433
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1110,
"timestamp": "2026-01-03T09:06:00Z",
"transaction_amount_usd": 281132.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.478,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2120400.39,
"financial_exposure_usd": 4494138.4,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108548",
"label": "benign",
"label_confidence": 0.493,
"severity": "high",
"timestamp": "2026-01-06T22:28:00Z",
"trace_id": "a7333a1d-b835-34c0-7d82-b63092ac0cfe"
} | {
"account_age_days": 838,
"account_id": "ACCT-D01EE8E1D4C2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.22
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 602,
"timestamp": "2026-01-06T22:28:00Z",
"transaction_amount_usd": 5371.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.676,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 9539.86,
"financial_exposure_usd": 10001.3,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106406",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "high",
"timestamp": "2026-01-05T10:46:00Z",
"trace_id": "13dba6e7-5e6a-8a73-6c20-e9132900b6e6"
} | {
"account_age_days": 1458,
"account_id": "ACCT-BF78DB30CBB5",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_2",
"session_entropy": 0.55
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 298,
"timestamp": "2026-01-04T23:37:00Z",
"transaction_amount_usd": 11.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.933,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100372",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "low",
"timestamp": "2026-01-01T06:12:00Z",
"trace_id": "04273ece-d121-3c1b-d8fc-0b1eed1cf073"
} | {
"account_age_days": 382,
"account_id": "ACCT-6EEF882AA9D8",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.921
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1146,
"timestamp": "2026-01-01T06:12:00Z",
"transaction_amount_usd": 55939.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.594,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 302614.99,
"financial_exposure_usd": 340594.99,
"recoverable_pct": 0.287
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103306",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-03T07:06:00Z",
"trace_id": "922b2dce-a13a-0f3a-09cd-1e40c72cb0e6"
} | {
"account_age_days": 239,
"account_id": "ACCT-99C21D8B80BA",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 99,
"timestamp": "2026-01-02T21:39:00Z",
"transaction_amount_usd": 7.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 556969.02,
"financial_exposure_usd": 656838.67,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105495",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "low",
"timestamp": "2026-01-04T19:35:00Z",
"trace_id": "403551af-0830-f8da-17f9-522b548d6cf0"
} | {
"account_age_days": 697,
"account_id": "ACCT-16631ADE0A0E",
"baseline_risk_score": 0.201,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 817,
"timestamp": "2026-01-04T19:35:00Z",
"transaction_amount_usd": 872024.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4097519.31,
"financial_exposure_usd": 4331284.92,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106273",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-05T08:33:00Z",
"trace_id": "ecdc7c65-244d-5d2e-9e00-346f2a3ce060"
} | {
"account_age_days": 1165,
"account_id": "ACCT-72F03C2F8B26",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_2",
"session_entropy": 0.467
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1088,
"timestamp": "2026-01-05T08:33:00Z",
"transaction_amount_usd": 2581596.93
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.586,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4211901.39,
"financial_exposure_usd": 4518788.71,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104440",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "medium",
"timestamp": "2026-01-04T02:00:00Z",
"trace_id": "30ade2e1-76a3-db21-edad-041d09c612e3"
} | {
"account_age_days": 560,
"account_id": "ACCT-151114F0A887",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_1",
"session_entropy": 0.813
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 298,
"timestamp": "2026-01-03T22:51:00Z",
"transaction_amount_usd": 13.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3007166.79,
"financial_exposure_usd": 4093669.28,
"recoverable_pct": 0.531
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109390",
"label": "benign",
"label_confidence": 0.515,
"severity": "critical",
"timestamp": "2026-01-07T12:30:00Z",
"trace_id": "d6c308dd-8b3a-bc68-c035-18ce84263984"
} | {
"account_age_days": 1718,
"account_id": "ACCT-DF35189F4145",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.809
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 626,
"timestamp": "2026-01-07T12:30:00Z",
"transaction_amount_usd": 10465.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6020.2,
"financial_exposure_usd": 7096.17,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106979",
"label": "benign",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-05T20:19:00Z",
"trace_id": "8eb42f23-7c0a-c349-4859-bdc265dd642f"
} | {
"account_age_days": 1862,
"account_id": "ACCT-1516DE557631",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.812
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 112,
"timestamp": "2026-01-05T20:19:00Z",
"transaction_amount_usd": 1060.87
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.637,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1498.48,
"financial_exposure_usd": 2034.08,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102007",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "high",
"timestamp": "2026-01-02T09:27:00Z",
"trace_id": "b62da658-171c-4152-5451-fa9c18528e81"
} | {
"account_age_days": 580,
"account_id": "ACCT-DAF1E5089BF6",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_1",
"session_entropy": 0.167
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1103,
"timestamp": "2026-01-02T09:27:00Z",
"transaction_amount_usd": 3696.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.507,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 341532.09,
"financial_exposure_usd": 447986.56,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101396",
"label": "fraudulent",
"label_confidence": 0.957,
"severity": "medium",
"timestamp": "2026-01-01T23:16:00Z",
"trace_id": "37c0e546-35ba-6188-b746-c6ef6ae8519e"
} | {
"account_age_days": 1166,
"account_id": "ACCT-3FDD537E3319",
"baseline_risk_score": 0.545,
"kyc_tier": "tier_3",
"session_entropy": 0.515
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 550,
"timestamp": "2026-01-01T23:16:00Z",
"transaction_amount_usd": 15146.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.63,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 1426563.91,
"financial_exposure_usd": 1441197.66,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107209",
"label": "benign",
"label_confidence": 0.59,
"severity": "medium",
"timestamp": "2026-01-06T00:09:00Z",
"trace_id": "5a1e07c6-a562-0de9-405d-5c0aca4efb85"
} | {
"account_age_days": 1844,
"account_id": "ACCT-1793E107ED89",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.715
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 536,
"timestamp": "2026-01-06T00:09:00Z",
"transaction_amount_usd": 1428.09
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1905.49,
"financial_exposure_usd": 3161.6,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106900",
"label": "benign",
"label_confidence": 0.471,
"severity": "high",
"timestamp": "2026-01-05T19:00:00Z",
"trace_id": "91947cfa-ab34-65e8-52e5-785605a57b5d"
} | {
"account_age_days": 1597,
"account_id": "ACCT-33D7A1AFF956",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.563
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 107,
"timestamp": "2026-01-05T19:00:00Z",
"transaction_amount_usd": 5467.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 667.53,
"financial_exposure_usd": 698.62,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108961",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-07T05:21:00Z",
"trace_id": "ad6a1e3a-6632-22ac-397e-b2ab4f5c1f9e"
} | {
"account_age_days": 1250,
"account_id": "ACCT-53CD8CD9D0E7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 763,
"timestamp": "2026-01-07T05:21:00Z",
"transaction_amount_usd": 12683.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.689,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3360.13,
"financial_exposure_usd": 3672.91,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104903",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "medium",
"timestamp": "2026-01-04T09:43:00Z",
"trace_id": "e0a7af25-8af4-1c3a-d5af-0e146756af05"
} | {
"account_age_days": 1408,
"account_id": "ACCT-F5EBCCF1E126",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_2",
"session_entropy": 0.311
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 303,
"timestamp": "2026-01-04T04:11:00Z",
"transaction_amount_usd": 14.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3203499.87,
"financial_exposure_usd": 5608911.43,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101344",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-01T22:24:00Z",
"trace_id": "0ef340cd-e158-cee3-9208-d532f99188c8"
} | {
"account_age_days": 1900,
"account_id": "ACCT-44F57082EE49",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_2",
"session_entropy": 0.362
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 246,
"timestamp": "2026-01-01T18:21:00Z",
"transaction_amount_usd": 13.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.537,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 288736.35,
"financial_exposure_usd": 379898.14,
"recoverable_pct": 0.783
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103630",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "medium",
"timestamp": "2026-01-03T12:30:00Z",
"trace_id": "4e3fd574-dc28-5bb5-ade8-e7b54d46bb74"
} | {
"account_age_days": 1649,
"account_id": "ACCT-AA61D9DB65FB",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_2",
"session_entropy": 0.483
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1164,
"timestamp": "2026-01-03T12:30:00Z",
"transaction_amount_usd": 811046.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.471,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3036702.68,
"financial_exposure_usd": 4589547.78,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104101",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "high",
"timestamp": "2026-01-03T20:21:00Z",
"trace_id": "0d117007-36d1-d61f-697f-57cc1f6233fd"
} | {
"account_age_days": 180,
"account_id": "ACCT-505A87119887",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_1",
"session_entropy": 0.747
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 787,
"timestamp": "2026-01-03T20:21:00Z",
"transaction_amount_usd": 1947630.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.783,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2990483.14,
"financial_exposure_usd": 4986986.24,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102048",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "critical",
"timestamp": "2026-01-02T10:08:00Z",
"trace_id": "5aa1ae70-545b-78d0-2cb5-7ad81bc0c874"
} | {
"account_age_days": 1483,
"account_id": "ACCT-ED5A7808C26F",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_1",
"session_entropy": 0.123
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 835,
"timestamp": "2026-01-02T10:08:00Z",
"transaction_amount_usd": 18104.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 638064.62,
"financial_exposure_usd": 1067501.84,
"recoverable_pct": 0.321
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106511",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "high",
"timestamp": "2026-01-05T12:31:00Z",
"trace_id": "55bf41c8-35a2-a067-4117-34f855b9d94e"
} | {
"account_age_days": 1745,
"account_id": "ACCT-43DFB8D9ABDD",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_1",
"session_entropy": 0.773
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 190,
"timestamp": "2026-01-05T09:47:00Z",
"transaction_amount_usd": 14.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.862,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1364016.34,
"financial_exposure_usd": 1973553.73,
"recoverable_pct": 0.411
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105265",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "medium",
"timestamp": "2026-01-04T15:45:00Z",
"trace_id": "585dc5c6-eb0c-5255-8aa9-7c71ee3ece5a"
} | {
"account_age_days": 635,
"account_id": "ACCT-3718969034A7",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_3",
"session_entropy": 0.568
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 131,
"timestamp": "2026-01-04T03:21:00Z",
"transaction_amount_usd": 9.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3380087.14,
"financial_exposure_usd": 4526463.6,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107316",
"label": "benign",
"label_confidence": 0.596,
"severity": "medium",
"timestamp": "2026-01-06T01:56:00Z",
"trace_id": "eb26b5dd-e01f-4404-ee64-d8ac5451043c"
} | {
"account_age_days": 724,
"account_id": "ACCT-D522EA08F9B4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.608
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 499,
"timestamp": "2026-01-06T01:56:00Z",
"transaction_amount_usd": 1319.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.781,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 381.22,
"financial_exposure_usd": 912.44,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105202",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "medium",
"timestamp": "2026-01-04T14:42:00Z",
"trace_id": "fb4db394-6080-7534-9a75-5f75ca5dbc7c"
} | {
"account_age_days": 1350,
"account_id": "ACCT-312FAA389006",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_2",
"session_entropy": 0.351
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 122,
"timestamp": "2026-01-04T07:36:00Z",
"transaction_amount_usd": 10.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.941,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3492359.05,
"financial_exposure_usd": 3961063.55,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105622",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "medium",
"timestamp": "2026-01-04T21:42:00Z",
"trace_id": "e05b4556-6304-d23b-7546-e69d350479f3"
} | {
"account_age_days": 1709,
"account_id": "ACCT-66D5451141E4",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_1",
"session_entropy": 0.683
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 201,
"timestamp": "2026-01-04T21:42:00Z",
"transaction_amount_usd": 1094615.98
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4956776.02,
"financial_exposure_usd": 6465862.46,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101100",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "high",
"timestamp": "2026-01-01T18:20:00Z",
"trace_id": "4247212f-8b3a-303e-b5a6-33bbb3a54c88"
} | {
"account_age_days": 1539,
"account_id": "ACCT-F544514FAC7B",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_1",
"session_entropy": 0.683
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 637,
"timestamp": "2026-01-01T18:20:00Z",
"transaction_amount_usd": 19887.9
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.59,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 313911.24,
"financial_exposure_usd": 511841.52,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100396",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "high",
"timestamp": "2026-01-01T06:36:00Z",
"trace_id": "ca43f7c5-052a-5c27-3d91-56b66e75f4a1"
} | {
"account_age_days": 52,
"account_id": "ACCT-54CBD831B7E4",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_3",
"session_entropy": 0.349
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 201,
"timestamp": "2026-01-01T06:36:00Z",
"transaction_amount_usd": 71926.69
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.727,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 254976.07,
"financial_exposure_usd": 272067.32,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109938",
"label": "benign",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-07T21:38:00Z",
"trace_id": "f97ec4f0-5459-1927-6bd8-6610c5a1f596"
} | {
"account_age_days": 779,
"account_id": "ACCT-60799E44B04B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 930,
"timestamp": "2026-01-07T21:38:00Z",
"transaction_amount_usd": 6468.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2412.8,
"financial_exposure_usd": 3510.1,
"recoverable_pct": 0.895
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103963",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "medium",
"timestamp": "2026-01-03T18:03:00Z",
"trace_id": "0278695a-f907-4e8c-a1e4-7bc51a10542a"
} | {
"account_age_days": 1359,
"account_id": "ACCT-97E8A8E57D2C",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_1",
"session_entropy": 0.835
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 345,
"timestamp": "2026-01-03T18:03:00Z",
"transaction_amount_usd": 2081030.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.569,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3075825.25,
"financial_exposure_usd": 5061960.93,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109540",
"label": "benign",
"label_confidence": 0.749,
"severity": "low",
"timestamp": "2026-01-07T15:00:00Z",
"trace_id": "084ef05f-0193-df82-71be-1f0e24960764"
} | {
"account_age_days": 1049,
"account_id": "ACCT-E6F866EBFC00",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.381
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 938,
"timestamp": "2026-01-07T15:00:00Z",
"transaction_amount_usd": 2501.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1187.27,
"financial_exposure_usd": 1204.98,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100512",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "critical",
"timestamp": "2026-01-01T08:32:00Z",
"trace_id": "83336fe8-4c89-cc83-3b8a-bb2d8b2e74a7"
} | {
"account_age_days": 859,
"account_id": "ACCT-96D2875FF484",
"baseline_risk_score": 0.625,
"kyc_tier": "tier_3",
"session_entropy": 0.43
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 222,
"timestamp": "2026-01-01T06:35:00Z",
"transaction_amount_usd": 10.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.388,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 486687.19,
"financial_exposure_usd": 610822.95,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101783",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "high",
"timestamp": "2026-01-02T05:43:00Z",
"trace_id": "105fca31-fa79-bc08-4ecf-5048c485c677"
} | {
"account_age_days": 671,
"account_id": "ACCT-FBB079F7A5D8",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_3",
"session_entropy": 0.688
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 353,
"timestamp": "2026-01-02T01:55:00Z",
"transaction_amount_usd": 23.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.857,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 457469.77,
"financial_exposure_usd": 852610.3,
"recoverable_pct": 0.216
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106482",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "medium",
"timestamp": "2026-01-05T12:02:00Z",
"trace_id": "01a38c54-8ecb-76ad-15cf-aaefb9299fab"
} | {
"account_age_days": 1924,
"account_id": "ACCT-1F854BCAB8A5",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_2",
"session_entropy": 0.881
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 459,
"timestamp": "2026-01-05T12:02:00Z",
"transaction_amount_usd": 460537.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.735,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2614917.29,
"financial_exposure_usd": 4105614.7,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105496",
"label": "fraudulent",
"label_confidence": 0.721,
"severity": "high",
"timestamp": "2026-01-04T19:36:00Z",
"trace_id": "7383f268-a93d-923b-c4ba-f1fa31de006b"
} | {
"account_age_days": 1709,
"account_id": "ACCT-6F13DACF8962",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.803
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 357,
"timestamp": "2026-01-04T14:39:00Z",
"transaction_amount_usd": 12.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.76,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3145784.6,
"financial_exposure_usd": 3834647.28,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109038",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T06:38:00Z",
"trace_id": "c2735d35-8f32-c838-33a2-1c4a871945ab"
} | {
"account_age_days": 1226,
"account_id": "ACCT-A3C6EB929C49",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.793
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 107,
"timestamp": "2026-01-07T01:24:00Z",
"transaction_amount_usd": 23.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.502,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 7219.35,
"financial_exposure_usd": 8862.72,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101311",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-01T21:51:00Z",
"trace_id": "861350c5-854b-295d-11a6-33207549c150"
} | {
"account_age_days": 1832,
"account_id": "ACCT-9002E87A8976",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_1",
"session_entropy": 0.125
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1021,
"timestamp": "2026-01-01T21:51:00Z",
"transaction_amount_usd": 38163.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.851,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 681530.61,
"financial_exposure_usd": 1347545,
"recoverable_pct": 0.389
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106145",
"label": "fraudulent",
"label_confidence": 0.685,
"severity": "medium",
"timestamp": "2026-01-05T06:25:00Z",
"trace_id": "25eecd89-d0da-f48e-d92c-1d29e56dad1c"
} | {
"account_age_days": 1077,
"account_id": "ACCT-C85C82F01948",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 708,
"timestamp": "2026-01-05T06:25:00Z",
"transaction_amount_usd": 916880.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.803,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5255346.11,
"financial_exposure_usd": 6541392.45,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107363",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-06T02:43:00Z",
"trace_id": "78bf3dfd-8fa9-ae1b-aebc-af23ea2d2282"
} | {
"account_age_days": 1009,
"account_id": "ACCT-9172CD1E9A54",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.59
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 151,
"timestamp": "2026-01-05T18:13:00Z",
"transaction_amount_usd": 1.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2937.37,
"financial_exposure_usd": 4373.3,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104232",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-03T22:32:00Z",
"trace_id": "d6653a49-0d55-09dd-934e-c250ca3d711d"
} | {
"account_age_days": 742,
"account_id": "ACCT-F0E6D7A07AC1",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_3",
"session_entropy": 0.414
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 179,
"timestamp": "2026-01-03T18:45:00Z",
"transaction_amount_usd": 3.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.42,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4608167.68,
"financial_exposure_usd": 5659135.29,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106419",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "critical",
"timestamp": "2026-01-05T10:59:00Z",
"trace_id": "a3053679-d490-76ff-5f76-8530430c32f8"
} | {
"account_age_days": 1745,
"account_id": "ACCT-5014CF1FE7D7",
"baseline_risk_score": 0.36,
"kyc_tier": "tier_2",
"session_entropy": 0.288
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 504,
"timestamp": "2026-01-05T10:59:00Z",
"transaction_amount_usd": 2290061.16
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.9,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 5036396,
"financial_exposure_usd": 6644827.18,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102762",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-02T22:02:00Z",
"trace_id": "a78a1d0a-d48b-6ed2-6a7d-df5cdb12c6c0"
} | {
"account_age_days": 1267,
"account_id": "ACCT-2BB1C3118062",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_2",
"session_entropy": 0.205
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 643,
"timestamp": "2026-01-02T22:02:00Z",
"transaction_amount_usd": 51874.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.411,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 450791.34,
"financial_exposure_usd": 756660.37,
"recoverable_pct": 0.153
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104613",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "medium",
"timestamp": "2026-01-04T04:53:00Z",
"trace_id": "b56cbf2a-7cad-b8d4-81c5-f9bc979c06a1"
} | {
"account_age_days": 1127,
"account_id": "ACCT-5B78C4C65FE4",
"baseline_risk_score": 0.387,
"kyc_tier": "tier_1",
"session_entropy": 0.19
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 166,
"timestamp": "2026-01-04T02:46:00Z",
"transaction_amount_usd": 19.6
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.679,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1287143.18,
"financial_exposure_usd": 2743051.77,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106103",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "critical",
"timestamp": "2026-01-05T05:43:00Z",
"trace_id": "09d1c7a5-26f9-bbbb-a2c0-13eeead221d8"
} | {
"account_age_days": 802,
"account_id": "ACCT-CA1CB12F3493",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.586
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 808,
"timestamp": "2026-01-05T05:43:00Z",
"transaction_amount_usd": 1726843.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.615,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1971093.51,
"financial_exposure_usd": 2672259.56,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100374",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-01T06:14:00Z",
"trace_id": "cedad670-c72c-ee50-71f0-be7a830f3db8"
} | {
"account_age_days": 1983,
"account_id": "ACCT-507DBC11C638",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_2",
"session_entropy": 0.265
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 200,
"timestamp": "2026-01-01T06:14:00Z",
"transaction_amount_usd": 909.93
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.449,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 647170.96,
"financial_exposure_usd": 678289.91,
"recoverable_pct": 0.007
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105174",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "critical",
"timestamp": "2026-01-04T14:14:00Z",
"trace_id": "ee7d8471-4de1-bedd-d70f-3104109f8721"
} | {
"account_age_days": 1765,
"account_id": "ACCT-B17F06EBEE82",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.683
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 637,
"timestamp": "2026-01-04T14:14:00Z",
"transaction_amount_usd": 1127535.35
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.371,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3689936.92,
"financial_exposure_usd": 3913347.85,
"recoverable_pct": 0.707
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109457",
"label": "benign",
"label_confidence": 0.545,
"severity": "critical",
"timestamp": "2026-01-07T13:37:00Z",
"trace_id": "c9b1762d-b792-ab22-96d5-5341d6edd6db"
} | {
"account_age_days": 523,
"account_id": "ACCT-DEC27BBC6B24",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.235
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 426,
"timestamp": "2026-01-07T13:37:00Z",
"transaction_amount_usd": 10385.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.496,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2113.3,
"financial_exposure_usd": 4866.47,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104271",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-03T23:11:00Z",
"trace_id": "b36fba39-c75a-4b01-c396-d6aa72bfe460"
} | {
"account_age_days": 629,
"account_id": "ACCT-5AC896C0B68C",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.846
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 147,
"timestamp": "2026-01-03T22:18:00Z",
"transaction_amount_usd": 8.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.368,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3059964.05,
"financial_exposure_usd": 6082898.4,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101637",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "critical",
"timestamp": "2026-01-02T03:17:00Z",
"trace_id": "809e0692-a931-428b-4f70-1850b2443af8"
} | {
"account_age_days": 1016,
"account_id": "ACCT-DE6D69298D4D",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.631
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 116,
"timestamp": "2026-01-02T03:17:00Z",
"transaction_amount_usd": 22893.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 305685.78,
"financial_exposure_usd": 576733.55,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100994",
"label": "fraudulent",
"label_confidence": 0.965,
"severity": "critical",
"timestamp": "2026-01-01T16:34:00Z",
"trace_id": "fdbe885c-a535-a77d-838f-eff5c38f3905"
} | {
"account_age_days": 131,
"account_id": "ACCT-528259726259",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_2",
"session_entropy": 0.723
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 988,
"timestamp": "2026-01-01T16:34:00Z",
"transaction_amount_usd": 44375.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.747,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 563660.75,
"financial_exposure_usd": 657131.55,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106475",
"label": "fraudulent",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-05T11:55:00Z",
"trace_id": "22b119ef-de4d-d5f5-d8b5-ece4e8c9ee6b"
} | {
"account_age_days": 171,
"account_id": "ACCT-DE21062AA9E5",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_3",
"session_entropy": 0.494
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 255,
"timestamp": "2026-01-05T10:27:00Z",
"transaction_amount_usd": 10.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5273686.17,
"financial_exposure_usd": 7804191.77,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101517",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "medium",
"timestamp": "2026-01-02T01:17:00Z",
"trace_id": "7e4d3cf6-b03a-ee67-6976-82a982f3fe3f"
} | {
"account_age_days": 702,
"account_id": "ACCT-0892C40497EF",
"baseline_risk_score": 0.49,
"kyc_tier": "tier_1",
"session_entropy": 0.686
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 500,
"timestamp": "2026-01-02T01:17:00Z",
"transaction_amount_usd": 46208.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.634,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 359766.96,
"financial_exposure_usd": 618008.26,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100761",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "high",
"timestamp": "2026-01-01T12:41:00Z",
"trace_id": "1b9632f0-adcb-9787-2024-03e7fddb7a02"
} | {
"account_age_days": 1514,
"account_id": "ACCT-C6F656E7BF97",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 618,
"timestamp": "2026-01-01T12:41:00Z",
"transaction_amount_usd": 49725.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.501,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 586829.72,
"financial_exposure_usd": 1178520.48,
"recoverable_pct": 0.098
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104765",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "low",
"timestamp": "2026-01-04T07:25:00Z",
"trace_id": "7fb8f5d3-8cae-7ea8-a85c-2e046391d820"
} | {
"account_age_days": 1580,
"account_id": "ACCT-8D617DAD5FB7",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_2",
"session_entropy": 0.463
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 651,
"timestamp": "2026-01-04T07:25:00Z",
"transaction_amount_usd": 1661063.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.674,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3087342.34,
"financial_exposure_usd": 4297285.88,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104584",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-04T04:24:00Z",
"trace_id": "823d4dc8-5036-61fb-24f5-b591aec65078"
} | {
"account_age_days": 215,
"account_id": "ACCT-12FEAF91A25E",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_2",
"session_entropy": 0.692
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 669,
"timestamp": "2026-01-04T04:24:00Z",
"transaction_amount_usd": 1530578.79
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.592,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3337679.45,
"financial_exposure_usd": 4847031.42,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105516",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "low",
"timestamp": "2026-01-04T19:56:00Z",
"trace_id": "9552c043-c06f-76b6-d269-3003547cc8fb"
} | {
"account_age_days": 511,
"account_id": "ACCT-03D3294C18ED",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_3",
"session_entropy": 0.203
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 725,
"timestamp": "2026-01-04T19:56:00Z",
"transaction_amount_usd": 671630.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.427,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5137476.16,
"financial_exposure_usd": 5527340.79,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108772",
"label": "benign",
"label_confidence": 0.732,
"severity": "medium",
"timestamp": "2026-01-07T02:12:00Z",
"trace_id": "71710c10-6904-84fb-d0ee-76dc25c86156"
} | {
"account_age_days": 1802,
"account_id": "ACCT-FC374A3B98A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.532
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 815,
"timestamp": "2026-01-07T02:12:00Z",
"transaction_amount_usd": 10864.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1790.28,
"financial_exposure_usd": 3353.49,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100826",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "critical",
"timestamp": "2026-01-01T13:46:00Z",
"trace_id": "edcb14d5-aff4-fc8d-23c9-58dccbf3f130"
} | {
"account_age_days": 129,
"account_id": "ACCT-381FF62FA2C5",
"baseline_risk_score": 0.602,
"kyc_tier": "tier_1",
"session_entropy": 0.166
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 170,
"timestamp": "2026-01-01T13:46:00Z",
"transaction_amount_usd": 21144.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.481,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 235712.11,
"financial_exposure_usd": 324290.27,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107428",
"label": "benign",
"label_confidence": 0.514,
"severity": "medium",
"timestamp": "2026-01-06T03:48:00Z",
"trace_id": "0e296c16-4f67-1799-c564-04c2fd7b59d7"
} | {
"account_age_days": 1446,
"account_id": "ACCT-DAF6390C22C5",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.178
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 121,
"timestamp": "2026-01-05T18:06:00Z",
"transaction_amount_usd": 5.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2671.11,
"financial_exposure_usd": 6144.98,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108090",
"label": "benign",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-06T14:50:00Z",
"trace_id": "69fae108-9d56-565f-c207-12cbe5702f6c"
} | {
"account_age_days": 1683,
"account_id": "ACCT-DD02AD69A6E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.678
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 948,
"timestamp": "2026-01-06T14:50:00Z",
"transaction_amount_usd": 6138.88
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3135.43,
"financial_exposure_usd": 4427.61,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102752",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "critical",
"timestamp": "2026-01-02T21:52:00Z",
"trace_id": "1d687129-da26-0988-27cf-f0654fe5c01c"
} | {
"account_age_days": 1069,
"account_id": "ACCT-C9BAC51FF68D",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_3",
"session_entropy": 0.329
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 453,
"timestamp": "2026-01-02T21:52:00Z",
"transaction_amount_usd": 59496.67
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.72,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 692944.07,
"financial_exposure_usd": 760371.23,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109704",
"label": "benign",
"label_confidence": 0.681,
"severity": "high",
"timestamp": "2026-01-07T17:44:00Z",
"trace_id": "cbd38ca9-cbc5-e449-6eb1-a8300c0407ed"
} | {
"account_age_days": 656,
"account_id": "ACCT-00D237674712",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_3",
"session_entropy": 0.898
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 276,
"timestamp": "2026-01-07T12:54:00Z",
"transaction_amount_usd": 13.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3574.98,
"financial_exposure_usd": 4292.99,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103708",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "critical",
"timestamp": "2026-01-03T13:48:00Z",
"trace_id": "12cb7528-ff17-3b12-0fee-5f56fbda765b"
} | {
"account_age_days": 1122,
"account_id": "ACCT-8F38C0E3CCAE",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_1",
"session_entropy": 0.787
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 149,
"timestamp": "2026-01-03T10:18:00Z",
"transaction_amount_usd": 11.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.382,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3478007.57,
"financial_exposure_usd": 6716638.61,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101959",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "critical",
"timestamp": "2026-01-02T08:39:00Z",
"trace_id": "a5fd843a-5a95-a72c-485a-801c5df50956"
} | {
"account_age_days": 879,
"account_id": "ACCT-EF88A3D2352D",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.77
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 415,
"timestamp": "2026-01-02T08:39:00Z",
"transaction_amount_usd": 109895.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.632,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 464816.04,
"financial_exposure_usd": 737861.67,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107442",
"label": "benign",
"label_confidence": 0.686,
"severity": "high",
"timestamp": "2026-01-06T04:02:00Z",
"trace_id": "40f02b5f-24c2-22ff-740c-a7121d47821b"
} | {
"account_age_days": 1546,
"account_id": "ACCT-ECDAA684552A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.198
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 169,
"timestamp": "2026-01-05T16:42:00Z",
"transaction_amount_usd": 12.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 527.27,
"financial_exposure_usd": 718.89,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106411",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "high",
"timestamp": "2026-01-05T10:51:00Z",
"trace_id": "f9c3d2b3-9af5-6f0a-019a-685797a6b72c"
} | {
"account_age_days": 1755,
"account_id": "ACCT-CADB60E4DA2A",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_1",
"session_entropy": 0.501
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 730,
"timestamp": "2026-01-05T10:51:00Z",
"transaction_amount_usd": 1512896.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3473743.57,
"financial_exposure_usd": 6883679.58,
"recoverable_pct": 0.465
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109996",
"label": "benign",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-07T22:36:00Z",
"trace_id": "3380a90b-9d8e-720f-3bc8-67bc156524d6"
} | {
"account_age_days": 412,
"account_id": "ACCT-6B42631C9463",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.283
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 525,
"timestamp": "2026-01-07T22:36:00Z",
"transaction_amount_usd": 806.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2512.4,
"financial_exposure_usd": 3493.82,
"recoverable_pct": 0.607
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104068",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-03T19:48:00Z",
"trace_id": "9130c96f-b1cb-f853-3cbe-431ffc540f04"
} | {
"account_age_days": 1070,
"account_id": "ACCT-06EFEB8C4675",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.393
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 378,
"timestamp": "2026-01-03T19:48:00Z",
"transaction_amount_usd": 1531662.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.403,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5444251.94,
"financial_exposure_usd": 5972096.27,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100532",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "critical",
"timestamp": "2026-01-01T08:52:00Z",
"trace_id": "23e4beaf-b865-19d5-642c-14aca9638663"
} | {
"account_age_days": 1996,
"account_id": "ACCT-BADBEA35E5C1",
"baseline_risk_score": 0.485,
"kyc_tier": "tier_1",
"session_entropy": 0.215
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 454,
"timestamp": "2026-01-01T08:52:00Z",
"transaction_amount_usd": 33831.86
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.794,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 794829.89,
"financial_exposure_usd": 915939.43,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104921",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "low",
"timestamp": "2026-01-04T10:01:00Z",
"trace_id": "9e7b81b8-9c1b-4057-229c-f0668fa7fb85"
} | {
"account_age_days": 1384,
"account_id": "ACCT-62C3A6C3DE74",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.425
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 317,
"timestamp": "2026-01-04T10:01:00Z",
"transaction_amount_usd": 2982244.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.839,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1257722.58,
"financial_exposure_usd": 3031637.96,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.