schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106350",
"label": "fraudulent",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-05T09:50:00Z",
"trace_id": "dde06020-7002-fd5d-ca6c-20aafabc1d33"
} | {
"account_age_days": 45,
"account_id": "ACCT-613D9EBEC3DF",
"baseline_risk_score": 0.096,
"kyc_tier": "tier_2",
"session_entropy": 0.495
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 811,
"timestamp": "2026-01-05T09:50:00Z",
"transaction_amount_usd": 2537850.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3126680.44,
"financial_exposure_usd": 5445028.04,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107131",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-05T22:51:00Z",
"trace_id": "715b0aa4-b08a-b3c3-ebf9-6b2ffe02e255"
} | {
"account_age_days": 1096,
"account_id": "ACCT-D9DA2A0579C7",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_1",
"session_entropy": 0.65
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 87,
"timestamp": "2026-01-05T22:51:00Z",
"transaction_amount_usd": 8819.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4222.78,
"financial_exposure_usd": 4805.22,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101460",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-02T00:20:00Z",
"trace_id": "baba2f19-5922-2f60-169d-2f704101b9dc"
} | {
"account_age_days": 235,
"account_id": "ACCT-5C04784DD4FB",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_2",
"session_entropy": 0.468
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 522,
"timestamp": "2026-01-02T00:20:00Z",
"transaction_amount_usd": 20661.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 353780.43,
"financial_exposure_usd": 400486.69,
"recoverable_pct": 0.712
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104688",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "high",
"timestamp": "2026-01-04T06:08:00Z",
"trace_id": "7d8a5472-be5b-4161-fa53-ebb58291a435"
} | {
"account_age_days": 653,
"account_id": "ACCT-E9900A38B1F6",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_2",
"session_entropy": 0.286
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1082,
"timestamp": "2026-01-04T06:08:00Z",
"transaction_amount_usd": 941377.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106456",
"label": "fraudulent",
"label_confidence": 0.717,
"severity": "high",
"timestamp": "2026-01-05T11:36:00Z",
"trace_id": "487d0ded-7d5b-56a8-f58d-38d19c63aeed"
} | {
"account_age_days": 1616,
"account_id": "ACCT-5ACA24929E0F",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_3",
"session_entropy": 0.478
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 860,
"timestamp": "2026-01-05T11:36:00Z",
"transaction_amount_usd": 2287363.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2743783.86,
"financial_exposure_usd": 3856335.92,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107473",
"label": "benign",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-06T04:33:00Z",
"trace_id": "1d4c1a74-ad56-ee5a-68aa-05ffba5341bf"
} | {
"account_age_days": 286,
"account_id": "ACCT-76E99509B2CB",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 675,
"timestamp": "2026-01-06T04:33:00Z",
"transaction_amount_usd": 1441.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3705.37,
"financial_exposure_usd": 6083.2,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107516",
"label": "benign",
"label_confidence": 0.507,
"severity": "high",
"timestamp": "2026-01-06T05:16:00Z",
"trace_id": "78f62063-2579-e865-e05f-ad27d10e070c"
} | {
"account_age_days": 122,
"account_id": "ACCT-84B6F2BCD5F9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.764
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 393,
"timestamp": "2026-01-06T05:16:00Z",
"transaction_amount_usd": 349.84
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.688,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 840.46,
"financial_exposure_usd": 1781.09,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109414",
"label": "benign",
"label_confidence": 0.743,
"severity": "high",
"timestamp": "2026-01-07T12:54:00Z",
"trace_id": "eb946412-19bc-a60c-82b2-69e72ef35b7b"
} | {
"account_age_days": 856,
"account_id": "ACCT-67B0017AFB8A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.18
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 460,
"timestamp": "2026-01-07T12:54:00Z",
"transaction_amount_usd": 5199.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.558,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2488.55,
"financial_exposure_usd": 5144.21,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101272",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "critical",
"timestamp": "2026-01-01T21:12:00Z",
"trace_id": "01b922ac-5aa5-5f2d-d7b5-25c721fcc000"
} | {
"account_age_days": 1639,
"account_id": "ACCT-9AB48892FE45",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_3",
"session_entropy": 0.796
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 103,
"timestamp": "2026-01-01T10:44:00Z",
"transaction_amount_usd": 1.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 791429.81,
"financial_exposure_usd": 960052.8,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105144",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-04T13:44:00Z",
"trace_id": "31c99eb0-ac7b-c4d2-8af9-029290a014e1"
} | {
"account_age_days": 1479,
"account_id": "ACCT-7B5F0C8366B9",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_3",
"session_entropy": 0.35
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1054,
"timestamp": "2026-01-04T13:44:00Z",
"transaction_amount_usd": 1120121.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.493,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 144545.4,
"financial_exposure_usd": 309770.63,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109081",
"label": "benign",
"label_confidence": 0.515,
"severity": "low",
"timestamp": "2026-01-07T07:21:00Z",
"trace_id": "8df1e179-ab70-2135-4a07-40ce3b578d0c"
} | {
"account_age_days": 413,
"account_id": "ACCT-3417A906ACE8",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.148
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 327,
"timestamp": "2026-01-07T07:21:00Z",
"transaction_amount_usd": 12667.68
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pri... | {
"customer_funds_at_risk_usd": 1638.98,
"financial_exposure_usd": 3072.46,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104161",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "critical",
"timestamp": "2026-01-03T21:21:00Z",
"trace_id": "940c4fd0-be65-5e58-9389-39a4a82e5be8"
} | {
"account_age_days": 1357,
"account_id": "ACCT-28F895D8CE57",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_1",
"session_entropy": 0.252
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1118,
"timestamp": "2026-01-03T21:21:00Z",
"transaction_amount_usd": 1101203.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.682,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4302258.38,
"financial_exposure_usd": 4801378.82,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100969",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "medium",
"timestamp": "2026-01-01T16:09:00Z",
"trace_id": "b16110d7-7fe8-0263-89fd-4aabef850585"
} | {
"account_age_days": 934,
"account_id": "ACCT-CE12024DCA58",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_1",
"session_entropy": 0.28
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 94,
"timestamp": "2026-01-01T08:30:00Z",
"transaction_amount_usd": 10.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.377,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 145602.88,
"financial_exposure_usd": 343929.6,
"recoverable_pct": 0.2
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108310",
"label": "benign",
"label_confidence": 0.677,
"severity": "high",
"timestamp": "2026-01-06T18:30:00Z",
"trace_id": "aa853b01-327d-11ce-f924-bd620d00d842"
} | {
"account_age_days": 1972,
"account_id": "ACCT-BF555636D73E",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_1",
"session_entropy": 0.462
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 377,
"timestamp": "2026-01-06T09:12:00Z",
"transaction_amount_usd": 19.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.723,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 947.68,
"financial_exposure_usd": 1638.21,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104659",
"label": "fraudulent",
"label_confidence": 0.621,
"severity": "high",
"timestamp": "2026-01-04T05:39:00Z",
"trace_id": "a7fe0e73-944e-3450-bbba-bcf69601576f"
} | {
"account_age_days": 1814,
"account_id": "ACCT-6A78625D64FA",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_2",
"session_entropy": 0.648
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 135,
"timestamp": "2026-01-04T05:39:00Z",
"transaction_amount_usd": 2450262.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.701,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2146228.86,
"financial_exposure_usd": 4341628.59,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107629",
"label": "benign",
"label_confidence": 0.528,
"severity": "low",
"timestamp": "2026-01-06T07:09:00Z",
"trace_id": "9960ff56-a0ad-431e-ea46-156bb5753b47"
} | {
"account_age_days": 1716,
"account_id": "ACCT-A954CA0787E4",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_3",
"session_entropy": 0.473
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 206,
"timestamp": "2026-01-06T02:25:00Z",
"transaction_amount_usd": 21.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1545.3,
"financial_exposure_usd": 2471.55,
"recoverable_pct": 0.791
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105210",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "medium",
"timestamp": "2026-01-04T14:50:00Z",
"trace_id": "ca2bd398-f0d5-ad03-4bc8-1b8da7db8e3c"
} | {
"account_age_days": 249,
"account_id": "ACCT-0D7DD64443ED",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.626
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 519,
"timestamp": "2026-01-04T14:50:00Z",
"transaction_amount_usd": 1407215.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3572473.14,
"financial_exposure_usd": 6291002.7,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108217",
"label": "benign",
"label_confidence": 0.743,
"severity": "medium",
"timestamp": "2026-01-06T16:57:00Z",
"trace_id": "e9302df4-59ec-694b-7baa-27cea30ae0d6"
} | {
"account_age_days": 1331,
"account_id": "ACCT-D617D6676685",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.88
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 455,
"timestamp": "2026-01-06T16:57:00Z",
"transaction_amount_usd": 6541.78
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1420.03,
"financial_exposure_usd": 2358.53,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102781",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "critical",
"timestamp": "2026-01-02T22:21:00Z",
"trace_id": "7b642ab5-3653-29c5-00fc-5c56e2ab5c34"
} | {
"account_age_days": 144,
"account_id": "ACCT-919521ECE18E",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_2",
"session_entropy": 0.67
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1142,
"timestamp": "2026-01-02T22:21:00Z",
"transaction_amount_usd": 51466.32
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.764,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 773736.98,
"financial_exposure_usd": 793965.43,
"recoverable_pct": 0.369
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105282",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-04T16:02:00Z",
"trace_id": "010ed470-d133-ff77-d409-7bc7cd398ba6"
} | {
"account_age_days": 1563,
"account_id": "ACCT-ACF3066B8FE8",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_3",
"session_entropy": 0.592
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 340,
"timestamp": "2026-01-04T08:09:00Z",
"transaction_amount_usd": 2.12
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.663,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2530377.24,
"financial_exposure_usd": 5563102.49,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109501",
"label": "benign",
"label_confidence": 0.535,
"severity": "high",
"timestamp": "2026-01-07T14:21:00Z",
"trace_id": "b27a113c-c36c-9062-9cab-1db09ddc16d1"
} | {
"account_age_days": 203,
"account_id": "ACCT-D46F10C65161",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_3",
"session_entropy": 0.89
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 702,
"timestamp": "2026-01-07T14:21:00Z",
"transaction_amount_usd": 4179.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 412.58,
"financial_exposure_usd": 568.71,
"recoverable_pct": 0.696
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105833",
"label": "fraudulent",
"label_confidence": 0.637,
"severity": "low",
"timestamp": "2026-01-05T01:13:00Z",
"trace_id": "47da01ed-1bde-fe2a-c4f9-f98c92a8dc3c"
} | {
"account_age_days": 46,
"account_id": "ACCT-342F983D34DA",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.75
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 196,
"timestamp": "2026-01-05T01:13:00Z",
"transaction_amount_usd": 2688358.6
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.482,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2383112.88,
"financial_exposure_usd": 3766585.04,
"recoverable_pct": 0.726
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107239",
"label": "benign",
"label_confidence": 0.642,
"severity": "critical",
"timestamp": "2026-01-06T00:39:00Z",
"trace_id": "7ea78f39-88c5-cc02-a6d5-fff2684cf9ea"
} | {
"account_age_days": 1921,
"account_id": "ACCT-A92D270E01C0",
"baseline_risk_score": 0.073,
"kyc_tier": "tier_1",
"session_entropy": 0.749
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 539,
"timestamp": "2026-01-06T00:39:00Z",
"transaction_amount_usd": 7087.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.795,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 594.97,
"financial_exposure_usd": 1178.24,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105183",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-04T14:23:00Z",
"trace_id": "1c850df6-e56c-690d-daa4-ae73d3a63db4"
} | {
"account_age_days": 1817,
"account_id": "ACCT-707AA3989F7C",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.16
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 177,
"timestamp": "2026-01-04T14:23:00Z",
"transaction_amount_usd": 1816734.24
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.547,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5548178.6,
"financial_exposure_usd": 7377134.8,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100675",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "critical",
"timestamp": "2026-01-01T11:15:00Z",
"trace_id": "5803e721-bba4-f59d-3a9c-db46c00759af"
} | {
"account_age_days": 177,
"account_id": "ACCT-B0862E2231F5",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_1",
"session_entropy": 0.18
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 311,
"timestamp": "2026-01-01T05:08:00Z",
"transaction_amount_usd": 10.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.897,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 260670.16,
"financial_exposure_usd": 345861.6,
"recoverable_pct": 0.171
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107266",
"label": "benign",
"label_confidence": 0.616,
"severity": "medium",
"timestamp": "2026-01-06T01:06:00Z",
"trace_id": "29b22d50-789c-fedf-874a-4a722593e9f9"
} | {
"account_age_days": 44,
"account_id": "ACCT-3B61F8E2C2B5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.286
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 398,
"timestamp": "2026-01-06T01:06:00Z",
"transaction_amount_usd": 6516.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 7484.18,
"financial_exposure_usd": 10457.83,
"recoverable_pct": 0.991
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104153",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-03T21:13:00Z",
"trace_id": "b3e14bdf-38d1-528e-5144-c5261a925f42"
} | {
"account_age_days": 211,
"account_id": "ACCT-829290023A39",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_1",
"session_entropy": 0.135
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 164,
"timestamp": "2026-01-03T12:46:00Z",
"transaction_amount_usd": 19.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.601,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4976056.59,
"financial_exposure_usd": 7901935.07,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105034",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "high",
"timestamp": "2026-01-04T11:54:00Z",
"trace_id": "d4e394d1-19c1-a03c-d4ce-8a7538ae279e"
} | {
"account_age_days": 1147,
"account_id": "ACCT-3F6D89C8C658",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_3",
"session_entropy": 0.736
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 270,
"timestamp": "2026-01-04T06:46:00Z",
"transaction_amount_usd": 12.01
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.606,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4519060.02,
"financial_exposure_usd": 7378979.43,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107119",
"label": "benign",
"label_confidence": 0.545,
"severity": "medium",
"timestamp": "2026-01-05T22:39:00Z",
"trace_id": "fd2a3e00-4470-4c2b-e3cc-4b3fa9df9cf5"
} | {
"account_age_days": 1305,
"account_id": "ACCT-20C2E8F3111C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.842
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 479,
"timestamp": "2026-01-05T22:39:00Z",
"transaction_amount_usd": 1049.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1332.13,
"financial_exposure_usd": 1846.62,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100882",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-01T14:42:00Z",
"trace_id": "7ced706b-106b-0b50-070b-1c579bb15579"
} | {
"account_age_days": 1665,
"account_id": "ACCT-F0366C0C1ED4",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_1",
"session_entropy": 0.254
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 242,
"timestamp": "2026-01-01T14:42:00Z",
"transaction_amount_usd": 52886.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 696294.74,
"financial_exposure_usd": 1170681.24,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102734",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-02T21:34:00Z",
"trace_id": "68e15b5a-02e4-77ef-cca8-e552ab803759"
} | {
"account_age_days": 861,
"account_id": "ACCT-88E1ECE94EF4",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_2",
"session_entropy": 0.409
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1096,
"timestamp": "2026-01-02T21:34:00Z",
"transaction_amount_usd": 30919.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 353151.77,
"financial_exposure_usd": 658599.39,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102217",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "medium",
"timestamp": "2026-01-02T12:57:00Z",
"trace_id": "27e54d98-49f7-e2ca-e184-c9e777205ad3"
} | {
"account_age_days": 1312,
"account_id": "ACCT-A65C1FBAE43A",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_1",
"session_entropy": 0.583
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 244,
"timestamp": "2026-01-02T12:57:00Z",
"transaction_amount_usd": 15956.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.477,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 530388.43,
"financial_exposure_usd": 685419.33,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105198",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "medium",
"timestamp": "2026-01-04T14:38:00Z",
"trace_id": "51076c35-808a-8107-fd7d-0e1e3138cb14"
} | {
"account_age_days": 1478,
"account_id": "ACCT-A269F0B72667",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_3",
"session_entropy": 0.752
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 263,
"timestamp": "2026-01-04T14:38:00Z",
"transaction_amount_usd": 2447461.12
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.608,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2775641.92,
"financial_exposure_usd": 6929503.91,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109702",
"label": "benign",
"label_confidence": 0.606,
"severity": "medium",
"timestamp": "2026-01-07T17:42:00Z",
"trace_id": "9db11ede-d9aa-6433-a840-9a9b5d37acb7"
} | {
"account_age_days": 1118,
"account_id": "ACCT-DA5B7A625E61",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_3",
"session_entropy": 0.615
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 128,
"timestamp": "2026-01-07T17:42:00Z",
"transaction_amount_usd": 938.09
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 613.96,
"financial_exposure_usd": 1028.38,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103689",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "medium",
"timestamp": "2026-01-03T13:29:00Z",
"trace_id": "31a87b4e-dd2d-7049-6fb7-bf97e7b2b73d"
} | {
"account_age_days": 1528,
"account_id": "ACCT-1929890ED7F5",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_3",
"session_entropy": 0.666
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 188,
"timestamp": "2026-01-03T11:01:00Z",
"transaction_amount_usd": 7.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.593,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5499162.36,
"financial_exposure_usd": 6172553.71,
"recoverable_pct": 0.551
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101072",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-01T17:52:00Z",
"trace_id": "cdae2efe-cf3b-4737-0630-748ae0fedaec"
} | {
"account_age_days": 22,
"account_id": "ACCT-32ED61DFA358",
"baseline_risk_score": 0.531,
"kyc_tier": "tier_1",
"session_entropy": 0.521
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1026,
"timestamp": "2026-01-01T17:52:00Z",
"transaction_amount_usd": 109221.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.908,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 172550.81,
"financial_exposure_usd": 342382.52,
"recoverable_pct": 0.17
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101444",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "medium",
"timestamp": "2026-01-02T00:04:00Z",
"trace_id": "3f1bb151-89f4-2acd-c4de-412a863c5d68"
} | {
"account_age_days": 1160,
"account_id": "ACCT-B7383C250701",
"baseline_risk_score": 0.453,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 395,
"timestamp": "2026-01-02T00:04:00Z",
"transaction_amount_usd": 85532.69
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.883,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 658926.23,
"financial_exposure_usd": 937740.38,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106091",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-05T05:31:00Z",
"trace_id": "8b89af11-1340-e3b8-fdeb-444d97baec97"
} | {
"account_age_days": 1297,
"account_id": "ACCT-A960E0A29314",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_1",
"session_entropy": 0.695
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 683,
"timestamp": "2026-01-05T05:31:00Z",
"transaction_amount_usd": 1396428.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.396,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1139824.52,
"financial_exposure_usd": 2673129.16,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106351",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "medium",
"timestamp": "2026-01-05T09:51:00Z",
"trace_id": "7b56baeb-17b1-4753-d3ec-b4f3b84a5ff1"
} | {
"account_age_days": 97,
"account_id": "ACCT-6FEC99CDCF9D",
"baseline_risk_score": 0.233,
"kyc_tier": "tier_3",
"session_entropy": 0.899
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1135,
"timestamp": "2026-01-05T09:51:00Z",
"transaction_amount_usd": 2581285.89
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.394,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2877834.52,
"financial_exposure_usd": 5996929.67,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100047",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "high",
"timestamp": "2026-01-01T00:47:00Z",
"trace_id": "3fc825ac-869b-c00f-cc15-2a1be2789642"
} | {
"account_age_days": 1007,
"account_id": "ACCT-8AC8AD937E02",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_1",
"session_entropy": 0.363
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 815,
"timestamp": "2026-01-01T00:47:00Z",
"transaction_amount_usd": 65466.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.384,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 485650.77,
"financial_exposure_usd": 1178887.64,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103380",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-03T08:20:00Z",
"trace_id": "1175aeb6-6f61-3c53-32d8-d434e03e3446"
} | {
"account_age_days": 77,
"account_id": "ACCT-2A0A563FF0C0",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.333
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 967,
"timestamp": "2026-01-03T08:20:00Z",
"transaction_amount_usd": 1919718.9
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.425,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1911443.55,
"financial_exposure_usd": 3911136.95,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103468",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "critical",
"timestamp": "2026-01-03T09:48:00Z",
"trace_id": "16603910-e1ca-c5e3-055d-b961756b7dfb"
} | {
"account_age_days": 892,
"account_id": "ACCT-DF22314C680B",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_3",
"session_entropy": 0.732
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 880,
"timestamp": "2026-01-03T09:48:00Z",
"transaction_amount_usd": 403669.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3003228.28,
"financial_exposure_usd": 6232259.79,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106059",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "low",
"timestamp": "2026-01-05T04:59:00Z",
"trace_id": "c2e5b1e9-da35-b5ca-671c-6dbe24bae687"
} | {
"account_age_days": 692,
"account_id": "ACCT-A75803C9FB73",
"baseline_risk_score": 0.253,
"kyc_tier": "tier_1",
"session_entropy": 0.747
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 341,
"timestamp": "2026-01-05T04:59:00Z",
"transaction_amount_usd": 596629.71
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.921,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2570362.95,
"financial_exposure_usd": 4885728.63,
"recoverable_pct": 0.958
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102429",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-02T16:29:00Z",
"trace_id": "76f13452-c471-952b-a6a8-dd140a374229"
} | {
"account_age_days": 1862,
"account_id": "ACCT-7762B285B8F6",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_2",
"session_entropy": 0.141
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1007,
"timestamp": "2026-01-02T16:29:00Z",
"transaction_amount_usd": 93814.31
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.48,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 356925.91,
"financial_exposure_usd": 624092.49,
"recoverable_pct": 0.199
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108705",
"label": "benign",
"label_confidence": 0.488,
"severity": "low",
"timestamp": "2026-01-07T01:05:00Z",
"trace_id": "035b2705-98e4-80e1-8a58-d147c6bdbb9e"
} | {
"account_age_days": 1604,
"account_id": "ACCT-C81B9E215102",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.303
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 740,
"timestamp": "2026-01-07T01:05:00Z",
"transaction_amount_usd": 9167.29
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4511.87,
"financial_exposure_usd": 4980.2,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109180",
"label": "benign",
"label_confidence": 0.462,
"severity": "medium",
"timestamp": "2026-01-07T09:00:00Z",
"trace_id": "b617c740-cf8e-ab42-bf21-2bdd27eb7b4f"
} | {
"account_age_days": 1399,
"account_id": "ACCT-E15C1639603D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.794
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 293,
"timestamp": "2026-01-07T01:32:00Z",
"transaction_amount_usd": 1.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.775,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 690.67,
"financial_exposure_usd": 953.82,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107463",
"label": "benign",
"label_confidence": 0.573,
"severity": "low",
"timestamp": "2026-01-06T04:23:00Z",
"trace_id": "3fe3216a-cd31-2db7-64ad-dbc1584fdbdf"
} | {
"account_age_days": 1567,
"account_id": "ACCT-96ACFA45A40A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.265
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 251,
"timestamp": "2026-01-06T04:23:00Z",
"transaction_amount_usd": 12664.03
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 540.15,
"financial_exposure_usd": 886.85,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109302",
"label": "benign",
"label_confidence": 0.672,
"severity": "low",
"timestamp": "2026-01-07T11:02:00Z",
"trace_id": "8a8f9745-498c-e68c-485a-5cb249267a87"
} | {
"account_age_days": 748,
"account_id": "ACCT-C32F908D38BB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.764
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 232,
"timestamp": "2026-01-07T11:02:00Z",
"transaction_amount_usd": 4679.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2339.36,
"financial_exposure_usd": 2536,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102628",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-02T19:48:00Z",
"trace_id": "903942ab-33db-6559-8bc2-f91a4c6bbd10"
} | {
"account_age_days": 1263,
"account_id": "ACCT-357165FEC022",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_1",
"session_entropy": 0.443
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 809,
"timestamp": "2026-01-02T19:48:00Z",
"transaction_amount_usd": 23245.15
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.788,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 374569,
"financial_exposure_usd": 842206.48,
"recoverable_pct": 0.115
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109891",
"label": "benign",
"label_confidence": 0.647,
"severity": "medium",
"timestamp": "2026-01-07T20:51:00Z",
"trace_id": "07816fe7-6309-2cd5-8680-54539556ccf7"
} | {
"account_age_days": 882,
"account_id": "ACCT-B423B6B5C0EE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.438
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 266,
"timestamp": "2026-01-07T14:38:00Z",
"transaction_amount_usd": 23.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3687.92,
"financial_exposure_usd": 7676.32,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109749",
"label": "benign",
"label_confidence": 0.608,
"severity": "medium",
"timestamp": "2026-01-07T18:29:00Z",
"trace_id": "fa0416d7-ff4c-322c-fa48-d9131d42b21a"
} | {
"account_age_days": 801,
"account_id": "ACCT-0579EE1007E1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 529,
"timestamp": "2026-01-07T18:29:00Z",
"transaction_amount_usd": 2792.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 665.76,
"financial_exposure_usd": 1283.34,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103646",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "critical",
"timestamp": "2026-01-03T12:46:00Z",
"trace_id": "eca77835-22d3-e52d-3a83-41d0eb45f5e4"
} | {
"account_age_days": 44,
"account_id": "ACCT-52736AE5261E",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.562
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 290,
"timestamp": "2026-01-03T12:46:00Z",
"transaction_amount_usd": 630060.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.638,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4534016.69,
"financial_exposure_usd": 5058709.1,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105548",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "medium",
"timestamp": "2026-01-04T20:28:00Z",
"trace_id": "28cd514e-08f5-1e4e-b887-3fc0dd198bd8"
} | {
"account_age_days": 721,
"account_id": "ACCT-8042E0CA6BE6",
"baseline_risk_score": 0.212,
"kyc_tier": "tier_1",
"session_entropy": 0.688
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 210,
"timestamp": "2026-01-04T20:28:00Z",
"transaction_amount_usd": 2230104.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7115457.19,
"financial_exposure_usd": 7270333.14,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100331",
"label": "fraudulent",
"label_confidence": 0.861,
"severity": "low",
"timestamp": "2026-01-01T05:31:00Z",
"trace_id": "e009a2cd-3157-f09a-3edf-dad0c6988643"
} | {
"account_age_days": 1753,
"account_id": "ACCT-20CBBD966699",
"baseline_risk_score": 0.342,
"kyc_tier": "tier_2",
"session_entropy": 0.903
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 83,
"timestamp": "2026-01-01T02:00:00Z",
"transaction_amount_usd": 14.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.541,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 172806.78,
"financial_exposure_usd": 313552.95,
"recoverable_pct": 0.087
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107067",
"label": "benign",
"label_confidence": 0.743,
"severity": "high",
"timestamp": "2026-01-05T21:47:00Z",
"trace_id": "5f986992-49f7-9100-b3e6-b26403c9ebb2"
} | {
"account_age_days": 619,
"account_id": "ACCT-77D361CA02B5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.711
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 574,
"timestamp": "2026-01-05T21:47:00Z",
"transaction_amount_usd": 4265.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 967.79,
"financial_exposure_usd": 2096.46,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107405",
"label": "benign",
"label_confidence": 0.525,
"severity": "critical",
"timestamp": "2026-01-06T03:25:00Z",
"trace_id": "7603f7f0-63c4-2af9-067f-e489b5c75081"
} | {
"account_age_days": 209,
"account_id": "ACCT-E9F0C57EC4E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.299
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 298,
"timestamp": "2026-01-05T20:10:00Z",
"transaction_amount_usd": 18.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.65,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2202.2,
"financial_exposure_usd": 4223.52,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103950",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "high",
"timestamp": "2026-01-03T17:50:00Z",
"trace_id": "26db2e8b-d25c-e7b3-9a3f-4f991e89a9e3"
} | {
"account_age_days": 1379,
"account_id": "ACCT-DC91BEE52809",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_3",
"session_entropy": 0.661
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 876,
"timestamp": "2026-01-03T17:50:00Z",
"transaction_amount_usd": 2724974.26
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2088977.39,
"financial_exposure_usd": 4981135.99,
"recoverable_pct": 0.78
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104828",
"label": "fraudulent",
"label_confidence": 0.635,
"severity": "high",
"timestamp": "2026-01-04T08:28:00Z",
"trace_id": "2e4173c4-e2b2-3a2a-1214-fb4c93893d9c"
} | {
"account_age_days": 1510,
"account_id": "ACCT-5DC991EE654C",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_3",
"session_entropy": 0.934
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 431,
"timestamp": "2026-01-04T08:28:00Z",
"transaction_amount_usd": 1126866.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1132604.22,
"financial_exposure_usd": 2372775.36,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104718",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "low",
"timestamp": "2026-01-04T06:38:00Z",
"trace_id": "2d76a1b9-6b60-1e4a-a176-c109749b2155"
} | {
"account_age_days": 100,
"account_id": "ACCT-58808E5681F4",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_1",
"session_entropy": 0.757
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 107,
"timestamp": "2026-01-04T06:38:00Z",
"transaction_amount_usd": 1207623.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.857,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3260806.55,
"financial_exposure_usd": 6135913.6,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101363",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "medium",
"timestamp": "2026-01-01T22:43:00Z",
"trace_id": "8bb9c636-adb4-c9dc-b7f2-7d6934652fd7"
} | {
"account_age_days": 1020,
"account_id": "ACCT-8A55748EEC1E",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.509
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 665,
"timestamp": "2026-01-01T22:43:00Z",
"transaction_amount_usd": 61173.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.947,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 668979.32,
"financial_exposure_usd": 1013177.58,
"recoverable_pct": 0.526
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104047",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "medium",
"timestamp": "2026-01-03T19:27:00Z",
"trace_id": "460f95a6-8b4c-2441-a5a4-08c715ff41e3"
} | {
"account_age_days": 1658,
"account_id": "ACCT-4FA9B3C402AB",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_3",
"session_entropy": 0.827
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 163,
"timestamp": "2026-01-03T17:29:00Z",
"transaction_amount_usd": 23.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.653,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3647461.82,
"financial_exposure_usd": 5829916.36,
"recoverable_pct": 0.927
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100822",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "medium",
"timestamp": "2026-01-01T13:42:00Z",
"trace_id": "772b90d5-a5e6-ae05-3a38-99c3240a2db9"
} | {
"account_age_days": 959,
"account_id": "ACCT-1B9D18715384",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 874,
"timestamp": "2026-01-01T13:42:00Z",
"transaction_amount_usd": 50743.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.586,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 708304.59,
"financial_exposure_usd": 710920.76,
"recoverable_pct": 0.058
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109613",
"label": "benign",
"label_confidence": 0.525,
"severity": "high",
"timestamp": "2026-01-07T16:13:00Z",
"trace_id": "990f0505-7d28-35e2-4e2a-5e43d5bee663"
} | {
"account_age_days": 1823,
"account_id": "ACCT-A942C4670A5D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.274
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 362,
"timestamp": "2026-01-07T16:13:00Z",
"transaction_amount_usd": 2745
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.673,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1787.23,
"financial_exposure_usd": 3955.09,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105453",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-04T18:53:00Z",
"trace_id": "874774a0-fa25-c2df-c0ab-fcc598fb0db8"
} | {
"account_age_days": 1159,
"account_id": "ACCT-DF14C82BADE5",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_1",
"session_entropy": 0.66
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 111,
"timestamp": "2026-01-04T08:33:00Z",
"transaction_amount_usd": 15.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.843,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3221316.26,
"financial_exposure_usd": 4349925.65,
"recoverable_pct": 0.558
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104122",
"label": "fraudulent",
"label_confidence": 0.937,
"severity": "high",
"timestamp": "2026-01-03T20:42:00Z",
"trace_id": "82630211-61a9-7c58-1726-5621ef813008"
} | {
"account_age_days": 829,
"account_id": "ACCT-4C5565329782",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.92
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 975,
"timestamp": "2026-01-03T20:42:00Z",
"transaction_amount_usd": 2980984.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.687,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1620370.66,
"financial_exposure_usd": 3979045.84,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100021",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "critical",
"timestamp": "2026-01-01T00:21:00Z",
"trace_id": "da003f16-b946-9bcf-4082-cbb948bddb3e"
} | {
"account_age_days": 1543,
"account_id": "ACCT-71B701AAF836",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_3",
"session_entropy": 0.619
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 369,
"timestamp": "2026-01-01T00:21:00Z",
"transaction_amount_usd": 72522.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 448030.17,
"financial_exposure_usd": 764973.37,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103972",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-03T18:12:00Z",
"trace_id": "af8f98e4-58c8-19be-3ee5-7a557e41cc22"
} | {
"account_age_days": 900,
"account_id": "ACCT-9ACD8E8DB5AD",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_3",
"session_entropy": 0.544
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 281,
"timestamp": "2026-01-03T08:40:00Z",
"transaction_amount_usd": 11.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.479,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2678071.44,
"financial_exposure_usd": 5061657.18,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101555",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-02T01:55:00Z",
"trace_id": "dacf3e1c-d8dd-9c0e-d8bf-f125ae779026"
} | {
"account_age_days": 166,
"account_id": "ACCT-1D90F6607722",
"baseline_risk_score": 0.6,
"kyc_tier": "tier_2",
"session_entropy": 0.737
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 148,
"timestamp": "2026-01-01T20:44:00Z",
"transaction_amount_usd": 5.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.942,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 537451.88,
"financial_exposure_usd": 736389.83,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109570",
"label": "benign",
"label_confidence": 0.643,
"severity": "high",
"timestamp": "2026-01-07T15:30:00Z",
"trace_id": "e21c728c-2c16-0f35-aefe-8b6675614b4e"
} | {
"account_age_days": 1489,
"account_id": "ACCT-6F9AC4AB8F4D",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_2",
"session_entropy": 0.276
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1090,
"timestamp": "2026-01-07T15:30:00Z",
"transaction_amount_usd": 7328.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3010.17,
"financial_exposure_usd": 3024.65,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103591",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "medium",
"timestamp": "2026-01-03T11:51:00Z",
"trace_id": "1945a831-0abc-91e4-a4f8-a7445d1b3819"
} | {
"account_age_days": 1545,
"account_id": "ACCT-403D99D6637D",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_3",
"session_entropy": 0.817
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 280,
"timestamp": "2026-01-03T09:41:00Z",
"transaction_amount_usd": 0.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 940110.16,
"financial_exposure_usd": 1220295.59,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102206",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "critical",
"timestamp": "2026-01-02T12:46:00Z",
"trace_id": "3ab783e4-1dbe-6606-948f-70824274ca58"
} | {
"account_age_days": 1298,
"account_id": "ACCT-F6100BDDC2A1",
"baseline_risk_score": 0.526,
"kyc_tier": "tier_3",
"session_entropy": 0.39
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 254,
"timestamp": "2026-01-02T03:00:00Z",
"transaction_amount_usd": 4.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.861,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 751203.47,
"financial_exposure_usd": 769971.47,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107994",
"label": "benign",
"label_confidence": 0.467,
"severity": "high",
"timestamp": "2026-01-06T13:14:00Z",
"trace_id": "12f67a5d-777b-f89a-aab0-099e722401b9"
} | {
"account_age_days": 501,
"account_id": "ACCT-8EF291CA5E6A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.588
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 922,
"timestamp": "2026-01-06T13:14:00Z",
"transaction_amount_usd": 3175.38
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.609,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5203.87,
"financial_exposure_usd": 6737.25,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109264",
"label": "benign",
"label_confidence": 0.461,
"severity": "medium",
"timestamp": "2026-01-07T10:24:00Z",
"trace_id": "932bd6a7-3603-da81-ed45-37ef1843b043"
} | {
"account_age_days": 244,
"account_id": "ACCT-A2F746A9896F",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.726
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1069,
"timestamp": "2026-01-07T10:24:00Z",
"transaction_amount_usd": 11564.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 780.72,
"financial_exposure_usd": 1095.38,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103991",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "high",
"timestamp": "2026-01-03T18:31:00Z",
"trace_id": "843b3a26-0531-6e2a-b3a1-b360c16fcd50"
} | {
"account_age_days": 1074,
"account_id": "ACCT-EC3CBEFDC175",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_2",
"session_entropy": 0.78
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 108,
"timestamp": "2026-01-03T12:14:00Z",
"transaction_amount_usd": 4.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.641,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2643933.1,
"financial_exposure_usd": 3049049.51,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102230",
"label": "fraudulent",
"label_confidence": 0.895,
"severity": "medium",
"timestamp": "2026-01-02T13:10:00Z",
"trace_id": "b1ae96f8-c4af-cb2b-ac3b-07283bf5b54a"
} | {
"account_age_days": 614,
"account_id": "ACCT-28744CBDCA2D",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_1",
"session_entropy": 0.397
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 110,
"timestamp": "2026-01-02T04:53:00Z",
"transaction_amount_usd": 20.53
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.814,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 461911.79,
"financial_exposure_usd": 476890.42,
"recoverable_pct": 0.162
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108278",
"label": "benign",
"label_confidence": 0.542,
"severity": "low",
"timestamp": "2026-01-06T17:58:00Z",
"trace_id": "6e5cde00-e75c-f36b-a448-cbaefc1d6597"
} | {
"account_age_days": 447,
"account_id": "ACCT-583C82790118",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.442
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1042,
"timestamp": "2026-01-06T17:58:00Z",
"transaction_amount_usd": 536.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1425.97,
"financial_exposure_usd": 3038.49,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108229",
"label": "benign",
"label_confidence": 0.524,
"severity": "high",
"timestamp": "2026-01-06T17:09:00Z",
"trace_id": "899c8736-3f17-6533-fb10-349b624ede34"
} | {
"account_age_days": 29,
"account_id": "ACCT-0C46E96EE9C4",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_3",
"session_entropy": 0.89
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1061,
"timestamp": "2026-01-06T17:09:00Z",
"transaction_amount_usd": 11027.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 538.58,
"financial_exposure_usd": 1180.7,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100123",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "critical",
"timestamp": "2026-01-01T02:03:00Z",
"trace_id": "92455468-6088-825e-e382-6da16cce4c23"
} | {
"account_age_days": 1554,
"account_id": "ACCT-67DFC9AFF220",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_3",
"session_entropy": 0.799
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 684,
"timestamp": "2026-01-01T02:03:00Z",
"transaction_amount_usd": 45205.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 317322.35,
"financial_exposure_usd": 345185.87,
"recoverable_pct": 0.193
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105791",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-05T00:31:00Z",
"trace_id": "b18ab577-6a79-b3d1-69b6-8900f193f09c"
} | {
"account_age_days": 207,
"account_id": "ACCT-363D160135F8",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_3",
"session_entropy": 0.642
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 960,
"timestamp": "2026-01-05T00:31:00Z",
"transaction_amount_usd": 1604172.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.716,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1977268.32,
"financial_exposure_usd": 3939727.7,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107072",
"label": "benign",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-05T21:52:00Z",
"trace_id": "2a899319-0641-f6e3-71c6-fca8f41cee44"
} | {
"account_age_days": 1510,
"account_id": "ACCT-46E9C04E4512",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.676
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1005,
"timestamp": "2026-01-05T21:52:00Z",
"transaction_amount_usd": 319.65
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2421.03,
"financial_exposure_usd": 4999.62,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105196",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "medium",
"timestamp": "2026-01-04T14:36:00Z",
"trace_id": "0f2f64a4-6e71-4b5d-274e-303ca32a036b"
} | {
"account_age_days": 1132,
"account_id": "ACCT-A644BBB5F605",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_1",
"session_entropy": 0.39
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1102,
"timestamp": "2026-01-04T14:36:00Z",
"transaction_amount_usd": 840362.72
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.444,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2827937.46,
"financial_exposure_usd": 2916482.95,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101035",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-01T17:15:00Z",
"trace_id": "d67b2ef2-b157-8bc8-4a68-e29010557be7"
} | {
"account_age_days": 1670,
"account_id": "ACCT-CFF7DF41D6F8",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_1",
"session_entropy": 0.715
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 534,
"timestamp": "2026-01-01T17:15:00Z",
"transaction_amount_usd": 108234.17
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 738645.66,
"financial_exposure_usd": 1439872.87,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103437",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-03T09:17:00Z",
"trace_id": "f4c87f01-014f-6abb-4767-58e57e7d63fe"
} | {
"account_age_days": 646,
"account_id": "ACCT-D2C31E4778F9",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 886,
"timestamp": "2026-01-03T09:17:00Z",
"transaction_amount_usd": 1940629.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1671913.17,
"financial_exposure_usd": 2798496.09,
"recoverable_pct": 0.892
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101876",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "medium",
"timestamp": "2026-01-02T07:16:00Z",
"trace_id": "af1ef52e-5757-0093-dbfe-de136def81dc"
} | {
"account_age_days": 275,
"account_id": "ACCT-26FC616DE472",
"baseline_risk_score": 0.532,
"kyc_tier": "tier_2",
"session_entropy": 0.701
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 631,
"timestamp": "2026-01-02T07:16:00Z",
"transaction_amount_usd": 51901.3
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.525,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 769793.13,
"financial_exposure_usd": 1090530.17,
"recoverable_pct": 0.362
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106121",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "high",
"timestamp": "2026-01-05T06:01:00Z",
"trace_id": "c64cfd24-2818-ff84-62e1-6b239635ecc4"
} | {
"account_age_days": 1922,
"account_id": "ACCT-A32CFC0283D5",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.507
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 829,
"timestamp": "2026-01-05T06:01:00Z",
"transaction_amount_usd": 1018055.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2193012.41,
"financial_exposure_usd": 4753828.14,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108550",
"label": "benign",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-06T22:30:00Z",
"trace_id": "98b00044-48a2-18bc-3682-8a0b0bb9ec2a"
} | {
"account_age_days": 1680,
"account_id": "ACCT-7A613823BE07",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_2",
"session_entropy": 0.839
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 101,
"timestamp": "2026-01-06T14:24:00Z",
"transaction_amount_usd": 16.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3819.79,
"financial_exposure_usd": 4616.07,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107388",
"label": "benign",
"label_confidence": 0.513,
"severity": "low",
"timestamp": "2026-01-06T03:08:00Z",
"trace_id": "b78dec6a-4997-0a34-80dd-322a61604254"
} | {
"account_age_days": 1892,
"account_id": "ACCT-44E356560304",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.183
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 888,
"timestamp": "2026-01-06T03:08:00Z",
"transaction_amount_usd": 14456.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.592,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2742.5,
"financial_exposure_usd": 5908.59,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101597",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "critical",
"timestamp": "2026-01-02T02:37:00Z",
"trace_id": "8d3fd284-4dcb-6a48-27c4-0e05958b6478"
} | {
"account_age_days": 145,
"account_id": "ACCT-AE24C0AD5D66",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_3",
"session_entropy": 0.396
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 709,
"timestamp": "2026-01-02T02:37:00Z",
"transaction_amount_usd": 110985.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 818548.15,
"financial_exposure_usd": 912354.32,
"recoverable_pct": 0.08
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106365",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "medium",
"timestamp": "2026-01-05T10:05:00Z",
"trace_id": "2ab6fb15-3ba0-0589-ad16-dbc591ea061d"
} | {
"account_age_days": 1565,
"account_id": "ACCT-E0AF3B516FED",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.713
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 343,
"timestamp": "2026-01-05T01:52:00Z",
"transaction_amount_usd": 20.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.931,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4090039.66,
"financial_exposure_usd": 5847632.27,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101342",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-01T22:22:00Z",
"trace_id": "eec73937-0cce-e824-6d9b-837cb5286877"
} | {
"account_age_days": 1726,
"account_id": "ACCT-45CB3BBB3636",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_2",
"session_entropy": 0.11
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1097,
"timestamp": "2026-01-01T22:22:00Z",
"transaction_amount_usd": 946.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.629,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 688552.75,
"financial_exposure_usd": 1023163.68,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109658",
"label": "benign",
"label_confidence": 0.657,
"severity": "low",
"timestamp": "2026-01-07T16:58:00Z",
"trace_id": "da939101-3534-3a24-94dc-27b0fe4bc6fa"
} | {
"account_age_days": 1456,
"account_id": "ACCT-23E631470695",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 393,
"timestamp": "2026-01-07T16:58:00Z",
"transaction_amount_usd": 10664.49
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.484,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 212.51,
"financial_exposure_usd": 279.31,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104053",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "medium",
"timestamp": "2026-01-03T19:33:00Z",
"trace_id": "f327c142-408d-9cf0-01a0-aab2c0ec7a76"
} | {
"account_age_days": 1246,
"account_id": "ACCT-D5697CF4A922",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_1",
"session_entropy": 0.533
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1134,
"timestamp": "2026-01-03T19:33:00Z",
"transaction_amount_usd": 2813487.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.469,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4925760.86,
"financial_exposure_usd": 8411292.41,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103862",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "medium",
"timestamp": "2026-01-03T16:22:00Z",
"trace_id": "66ea6cbe-60fc-e95a-7fa4-5677133ae432"
} | {
"account_age_days": 626,
"account_id": "ACCT-776098A9BECC",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_2",
"session_entropy": 0.606
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 279,
"timestamp": "2026-01-03T16:22:00Z",
"transaction_amount_usd": 316096.37
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2380412.67,
"financial_exposure_usd": 5584688.08,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107783",
"label": "benign",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-06T09:43:00Z",
"trace_id": "9cd2a032-b78b-fdb9-607d-c98a7caa3e6e"
} | {
"account_age_days": 1909,
"account_id": "ACCT-395445FFE9B1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.801
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1012,
"timestamp": "2026-01-06T09:43:00Z",
"transaction_amount_usd": 3617.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1611.98,
"financial_exposure_usd": 2846.21,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107413",
"label": "benign",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-06T03:33:00Z",
"trace_id": "ecbef004-9f4b-0ec0-a025-cbea4379d9df"
} | {
"account_age_days": 1827,
"account_id": "ACCT-A35B2A67D2D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.12
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 515,
"timestamp": "2026-01-06T03:33:00Z",
"transaction_amount_usd": 9193.39
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.707,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1113.71,
"financial_exposure_usd": 1576.34,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103549",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-03T11:09:00Z",
"trace_id": "ec707640-af5b-604c-31f4-2de80b601382"
} | {
"account_age_days": 1466,
"account_id": "ACCT-F97459ABA733",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_1",
"session_entropy": 0.774
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 160,
"timestamp": "2026-01-03T08:09:00Z",
"transaction_amount_usd": 5.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.543,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1901546.61,
"financial_exposure_usd": 2157054.3,
"recoverable_pct": 0.458
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106557",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-05T13:17:00Z",
"trace_id": "bb3d619e-ae5a-9af7-ac18-55a48c2949ab"
} | {
"account_age_days": 988,
"account_id": "ACCT-CC582CA53A51",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_1",
"session_entropy": 0.349
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 269,
"timestamp": "2026-01-05T13:17:00Z",
"transaction_amount_usd": 2012209.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.829,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2138845.76,
"financial_exposure_usd": 3913740.24,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105420",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "low",
"timestamp": "2026-01-04T18:20:00Z",
"trace_id": "e1b43690-c01f-423f-c8b9-2b1852685765"
} | {
"account_age_days": 1460,
"account_id": "ACCT-C77A1544F229",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_3",
"session_entropy": 0.612
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 831,
"timestamp": "2026-01-04T18:20:00Z",
"transaction_amount_usd": 1312921.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.932,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2974786.23,
"financial_exposure_usd": 4172784.63,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108262",
"label": "benign",
"label_confidence": 0.695,
"severity": "high",
"timestamp": "2026-01-06T17:42:00Z",
"trace_id": "235034a5-e05b-5e8b-21c0-f3ed936b0b80"
} | {
"account_age_days": 199,
"account_id": "ACCT-330EBD7A7348",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_1",
"session_entropy": 0.368
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 113,
"timestamp": "2026-01-06T14:08:00Z",
"transaction_amount_usd": 16.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3021.3,
"financial_exposure_usd": 5852.75,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106262",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-05T08:22:00Z",
"trace_id": "acc5e1cb-a11e-732d-2809-a451c87489ce"
} | {
"account_age_days": 1992,
"account_id": "ACCT-310DA04BF54E",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_1",
"session_entropy": 0.576
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 112,
"timestamp": "2026-01-05T08:22:00Z",
"transaction_amount_usd": 1759716.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.355,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5251466.29,
"financial_exposure_usd": 6489829.08,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.