schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104119",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "low",
"timestamp": "2026-01-03T20:39:00Z",
"trace_id": "9a0ade35-fe30-f0fb-d866-e45523bda8f8"
} | {
"account_age_days": 236,
"account_id": "ACCT-8DBA025A6FED",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_2",
"session_entropy": 0.533
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 179,
"timestamp": "2026-01-03T18:55:00Z",
"transaction_amount_usd": 6.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.449,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2018892.34,
"financial_exposure_usd": 4242006.71,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102305",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "critical",
"timestamp": "2026-01-02T14:25:00Z",
"trace_id": "7789571b-386f-63a0-b14b-5e7b5861b934"
} | {
"account_age_days": 1179,
"account_id": "ACCT-72A9B38FDA32",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_3",
"session_entropy": 0.693
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 339,
"timestamp": "2026-01-02T14:25:00Z",
"transaction_amount_usd": 44854.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.597,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 581442.37,
"financial_exposure_usd": 642559.84,
"recoverable_pct": 0.044
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108210",
"label": "benign",
"label_confidence": 0.526,
"severity": "low",
"timestamp": "2026-01-06T16:50:00Z",
"trace_id": "62a62379-24df-5bf1-6041-48195bed7475"
} | {
"account_age_days": 326,
"account_id": "ACCT-46AD2C5C0590",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.31
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 262,
"timestamp": "2026-01-06T16:50:00Z",
"transaction_amount_usd": 13731.44
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3301.33,
"financial_exposure_usd": 3723.01,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100236",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "high",
"timestamp": "2026-01-01T03:56:00Z",
"trace_id": "1c1d73b3-250a-8bc0-ef19-117fa452cdef"
} | {
"account_age_days": 159,
"account_id": "ACCT-8FFBC222F51E",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_1",
"session_entropy": 0.114
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1137,
"timestamp": "2026-01-01T03:56:00Z",
"transaction_amount_usd": 62882.37
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 331023.35,
"financial_exposure_usd": 512070.33,
"recoverable_pct": 0.037
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109257",
"label": "benign",
"label_confidence": 0.713,
"severity": "low",
"timestamp": "2026-01-07T10:17:00Z",
"trace_id": "d465c692-3554-d447-f825-dfe762bd7cf7"
} | {
"account_age_days": 1535,
"account_id": "ACCT-E0D52085A218",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.276
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 106,
"timestamp": "2026-01-06T23:49:00Z",
"transaction_amount_usd": 0.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 953.88,
"financial_exposure_usd": 1350.24,
"recoverable_pct": 0.884
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101923",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "critical",
"timestamp": "2026-01-02T08:03:00Z",
"trace_id": "9b9d797a-7cd6-3fd1-3ce9-8feb097688b2"
} | {
"account_age_days": 1568,
"account_id": "ACCT-2C2B98290768",
"baseline_risk_score": 0.483,
"kyc_tier": "tier_1",
"session_entropy": 0.32
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 872,
"timestamp": "2026-01-02T08:03:00Z",
"transaction_amount_usd": 32576.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.628,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 760690.33,
"financial_exposure_usd": 917098.29,
"recoverable_pct": 0.068
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108636",
"label": "benign",
"label_confidence": 0.578,
"severity": "high",
"timestamp": "2026-01-06T23:56:00Z",
"trace_id": "53f04d98-c5d4-476c-4224-da7b1df78644"
} | {
"account_age_days": 650,
"account_id": "ACCT-AB00C010EBE2",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_2",
"session_entropy": 0.164
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1009,
"timestamp": "2026-01-06T23:56:00Z",
"transaction_amount_usd": 11853.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.583,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2348.61,
"financial_exposure_usd": 5363.87,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105723",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "medium",
"timestamp": "2026-01-04T23:23:00Z",
"trace_id": "f935e4ff-5ebc-1af7-2d0a-ef31ad2817c3"
} | {
"account_age_days": 1949,
"account_id": "ACCT-A4DE50A2A926",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.47
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 627,
"timestamp": "2026-01-04T23:23:00Z",
"transaction_amount_usd": 795845.84
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.525,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 208532.51,
"financial_exposure_usd": 409150.02,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105848",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "critical",
"timestamp": "2026-01-05T01:28:00Z",
"trace_id": "875824e6-187d-9d45-c947-660af1b41855"
} | {
"account_age_days": 1204,
"account_id": "ACCT-1BBC1D5304B9",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1075,
"timestamp": "2026-01-05T01:28:00Z",
"transaction_amount_usd": 509930.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3171119.66,
"financial_exposure_usd": 6995798.73,
"recoverable_pct": 0.989
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108956",
"label": "benign",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-07T05:16:00Z",
"trace_id": "1a514ea1-79ef-2c7e-3166-1817491618a3"
} | {
"account_age_days": 367,
"account_id": "ACCT-1E5034655D2B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.128
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 526,
"timestamp": "2026-01-07T05:16:00Z",
"transaction_amount_usd": 8208.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 631.47,
"financial_exposure_usd": 679.11,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106015",
"label": "fraudulent",
"label_confidence": 0.742,
"severity": "low",
"timestamp": "2026-01-05T04:15:00Z",
"trace_id": "7aec8340-53ca-66ae-cacc-764b9b87992d"
} | {
"account_age_days": 964,
"account_id": "ACCT-05ADAA34B706",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_1",
"session_entropy": 0.894
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 361,
"timestamp": "2026-01-04T21:58:00Z",
"transaction_amount_usd": 8.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.391,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4273144.55,
"financial_exposure_usd": 5946388.96,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100953",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "critical",
"timestamp": "2026-01-01T15:53:00Z",
"trace_id": "00a90fa8-5241-c559-95f0-b34f5525e32b"
} | {
"account_age_days": 1949,
"account_id": "ACCT-688E3351FC62",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_1",
"session_entropy": 0.57
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 810,
"timestamp": "2026-01-01T15:53:00Z",
"transaction_amount_usd": 12405.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.419,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 551391.14,
"financial_exposure_usd": 1019723.34,
"recoverable_pct": 0.012
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105398",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "high",
"timestamp": "2026-01-04T17:58:00Z",
"trace_id": "749ee47f-fe56-a0bd-54a8-289f576bef23"
} | {
"account_age_days": 894,
"account_id": "ACCT-CD886AD60632",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_3",
"session_entropy": 0.297
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 304,
"timestamp": "2026-01-04T07:31:00Z",
"transaction_amount_usd": 1.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.37,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 4802418.19,
"financial_exposure_usd": 4982511.96,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106336",
"label": "fraudulent",
"label_confidence": 0.603,
"severity": "high",
"timestamp": "2026-01-05T09:36:00Z",
"trace_id": "f4c7c6de-4fcd-4069-a6af-29b63824fbec"
} | {
"account_age_days": 1011,
"account_id": "ACCT-EC18CD1E0732",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_3",
"session_entropy": 0.165
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 585,
"timestamp": "2026-01-05T09:36:00Z",
"transaction_amount_usd": 1865398.33
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1646798.3,
"financial_exposure_usd": 2948132.14,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105192",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "critical",
"timestamp": "2026-01-04T14:32:00Z",
"trace_id": "f635ec69-3439-0471-1d1e-fc845cc15756"
} | {
"account_age_days": 1807,
"account_id": "ACCT-D3BC252210DA",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_1",
"session_entropy": 0.372
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 468,
"timestamp": "2026-01-04T14:32:00Z",
"transaction_amount_usd": 2168228.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.574,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1306185.05,
"financial_exposure_usd": 2190013.46,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103504",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-03T10:24:00Z",
"trace_id": "f7c04f84-5ebc-e390-1601-0095fe32b734"
} | {
"account_age_days": 1780,
"account_id": "ACCT-4D1FA4817CEE",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_1",
"session_entropy": 0.892
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 1175,
"timestamp": "2026-01-03T10:24:00Z",
"transaction_amount_usd": 2147553.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.613,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1904931.57,
"financial_exposure_usd": 2226607.24,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101766",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-02T05:26:00Z",
"trace_id": "55ca5f01-aa86-9594-01cf-2a65ecbc108a"
} | {
"account_age_days": 980,
"account_id": "ACCT-CD0EB9E04F0D",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_1",
"session_entropy": 0.903
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 534,
"timestamp": "2026-01-02T05:26:00Z",
"transaction_amount_usd": 114918.12
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.493,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 474948.8,
"financial_exposure_usd": 842874.04,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101207",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "high",
"timestamp": "2026-01-01T20:07:00Z",
"trace_id": "576e71d2-397e-15a2-3cb8-368a0ab1062d"
} | {
"account_age_days": 654,
"account_id": "ACCT-155ABE016EFA",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_3",
"session_entropy": 0.828
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 345,
"timestamp": "2026-01-01T18:33:00Z",
"transaction_amount_usd": 0.98
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.818,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 252385.3,
"financial_exposure_usd": 539944.89,
"recoverable_pct": 0.138
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101688",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-02T04:08:00Z",
"trace_id": "7ef80e1c-1c92-a688-73ef-1e4c1a40e065"
} | {
"account_age_days": 1446,
"account_id": "ACCT-0E9822D90700",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_2",
"session_entropy": 0.537
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 380,
"timestamp": "2026-01-01T17:18:00Z",
"transaction_amount_usd": 17.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.636,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 481723.26,
"financial_exposure_usd": 728551.77,
"recoverable_pct": 0.315
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102005",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "critical",
"timestamp": "2026-01-02T09:25:00Z",
"trace_id": "fc5d88ed-85e8-c7d5-a881-8cce4a81b661"
} | {
"account_age_days": 235,
"account_id": "ACCT-84539A743366",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_1",
"session_entropy": 0.283
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 871,
"timestamp": "2026-01-02T09:25:00Z",
"transaction_amount_usd": 72567.99
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.617,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 711381.41,
"financial_exposure_usd": 819120.22,
"recoverable_pct": 0.094
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102919",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "medium",
"timestamp": "2026-01-03T00:39:00Z",
"trace_id": "2455597c-2264-d1ab-ad68-f1f6ce641996"
} | {
"account_age_days": 1175,
"account_id": "ACCT-9044F37CD3DA",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 234,
"timestamp": "2026-01-02T20:17:00Z",
"transaction_amount_usd": 7.03
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.434,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 897988.22,
"financial_exposure_usd": 1412400.49,
"recoverable_pct": 0.094
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102277",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-02T13:57:00Z",
"trace_id": "bb6422e2-1d34-e06c-81ce-4558c8470df9"
} | {
"account_age_days": 506,
"account_id": "ACCT-4BEE387C56C7",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_3",
"session_entropy": 0.882
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 216,
"timestamp": "2026-01-02T11:14:00Z",
"transaction_amount_usd": 14.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.643,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 200553.31,
"financial_exposure_usd": 335409.57,
"recoverable_pct": 0.002
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109103",
"label": "benign",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-07T07:43:00Z",
"trace_id": "965f28bd-ec37-c97d-b60c-47bddb94c62a"
} | {
"account_age_days": 1006,
"account_id": "ACCT-3880280F0AC6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.374
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 648,
"timestamp": "2026-01-07T07:43:00Z",
"transaction_amount_usd": 13895.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4802.55,
"financial_exposure_usd": 6338.47,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108260",
"label": "benign",
"label_confidence": 0.737,
"severity": "critical",
"timestamp": "2026-01-06T17:40:00Z",
"trace_id": "99a58386-1d83-9e30-4207-24c8977e3fbc"
} | {
"account_age_days": 1358,
"account_id": "ACCT-77C657C8B5EF",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.754
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 474,
"timestamp": "2026-01-06T17:40:00Z",
"transaction_amount_usd": 4607.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1521.21,
"financial_exposure_usd": 2846.44,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101797",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "high",
"timestamp": "2026-01-02T05:57:00Z",
"trace_id": "1a14a106-fd8b-fb6a-c67a-95984190222c"
} | {
"account_age_days": 1893,
"account_id": "ACCT-F7B4DDE2E773",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_2",
"session_entropy": 0.216
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 529,
"timestamp": "2026-01-02T05:57:00Z",
"transaction_amount_usd": 56775.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 284222.37,
"financial_exposure_usd": 316745.15,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105328",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-04T16:48:00Z",
"trace_id": "e168e359-4242-541c-58ae-7a4b3216e3a9"
} | {
"account_age_days": 1352,
"account_id": "ACCT-22CE810C28EA",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_3",
"session_entropy": 0.765
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 862,
"timestamp": "2026-01-04T16:48:00Z",
"transaction_amount_usd": 2486415.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.906,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2138966.74,
"financial_exposure_usd": 4089767.18,
"recoverable_pct": 0.793
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105668",
"label": "fraudulent",
"label_confidence": 0.659,
"severity": "high",
"timestamp": "2026-01-04T22:28:00Z",
"trace_id": "e7ef0c27-ab50-85e3-3392-4f64ddfce22f"
} | {
"account_age_days": 147,
"account_id": "ACCT-F1872452EAB1",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_3",
"session_entropy": 0.785
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 765,
"timestamp": "2026-01-04T22:28:00Z",
"transaction_amount_usd": 1976378.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.369,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3547332.93,
"financial_exposure_usd": 3856345.17,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108957",
"label": "benign",
"label_confidence": 0.609,
"severity": "high",
"timestamp": "2026-01-07T05:17:00Z",
"trace_id": "382586e1-058e-33e9-878f-9738cf1eb2f3"
} | {
"account_age_days": 1244,
"account_id": "ACCT-00636050BAE9",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 144,
"timestamp": "2026-01-06T20:36:00Z",
"transaction_amount_usd": 22.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.552,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4190.09,
"financial_exposure_usd": 4614.3,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107532",
"label": "benign",
"label_confidence": 0.522,
"severity": "low",
"timestamp": "2026-01-06T05:32:00Z",
"trace_id": "1ec298fb-0491-6f2a-7408-840ec6cf6c6e"
} | {
"account_age_days": 313,
"account_id": "ACCT-61DF7ECF78C2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.136
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 601,
"timestamp": "2026-01-06T05:32:00Z",
"transaction_amount_usd": 5475.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 981.08,
"financial_exposure_usd": 2373.22,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108475",
"label": "benign",
"label_confidence": 0.555,
"severity": "low",
"timestamp": "2026-01-06T21:15:00Z",
"trace_id": "bf40ef45-9cee-5ab2-dcaf-93f6a46bfc41"
} | {
"account_age_days": 846,
"account_id": "ACCT-3F93E5F4A446",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.78
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 704,
"timestamp": "2026-01-06T21:15:00Z",
"transaction_amount_usd": 7051.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.518,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3889.52,
"financial_exposure_usd": 4047.65,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106179",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-05T06:59:00Z",
"trace_id": "5c44e46e-0728-6453-731d-7c4f1fed70e3"
} | {
"account_age_days": 503,
"account_id": "ACCT-C1AFF44A8FCB",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_1",
"session_entropy": 0.427
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 772,
"timestamp": "2026-01-05T06:59:00Z",
"transaction_amount_usd": 2003674.55
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2002668.19,
"financial_exposure_usd": 2966816.67,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105585",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "high",
"timestamp": "2026-01-04T21:05:00Z",
"trace_id": "00afed3d-2347-466c-4b07-0e8b2014c774"
} | {
"account_age_days": 1741,
"account_id": "ACCT-D19DDAEB5CFF",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_2",
"session_entropy": 0.199
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1163,
"timestamp": "2026-01-04T21:05:00Z",
"transaction_amount_usd": 2854081.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.912,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3695566.11,
"financial_exposure_usd": 3748378.31,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100753",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "critical",
"timestamp": "2026-01-01T12:33:00Z",
"trace_id": "7253486e-0100-7b0a-2425-f74c9839eaea"
} | {
"account_age_days": 1254,
"account_id": "ACCT-D5EF6F496FD9",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_1",
"session_entropy": 0.553
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 87,
"timestamp": "2026-01-01T07:37:00Z",
"transaction_amount_usd": 17.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.894,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 396299.36,
"financial_exposure_usd": 693554.99,
"recoverable_pct": 0.136
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101179",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-01T19:39:00Z",
"trace_id": "309de929-11de-b03f-e0a9-dfb6c478589a"
} | {
"account_age_days": 1136,
"account_id": "ACCT-0475847E50D6",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_1",
"session_entropy": 0.19
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 85,
"timestamp": "2026-01-01T19:39:00Z",
"transaction_amount_usd": 105389.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 392871.78,
"financial_exposure_usd": 562598.79,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104670",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "medium",
"timestamp": "2026-01-04T05:50:00Z",
"trace_id": "cd4c464f-c489-abf1-057f-2fb78aa97196"
} | {
"account_age_days": 79,
"account_id": "ACCT-E28BFC9955D2",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 208,
"timestamp": "2026-01-04T05:50:00Z",
"transaction_amount_usd": 1263735.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.361,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2297291.25,
"financial_exposure_usd": 4006742.68,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105826",
"label": "fraudulent",
"label_confidence": 0.659,
"severity": "critical",
"timestamp": "2026-01-05T01:06:00Z",
"trace_id": "66180312-0928-ca53-c612-64820edc9f12"
} | {
"account_age_days": 1903,
"account_id": "ACCT-D1C40770EF28",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.734
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 286,
"timestamp": "2026-01-04T14:13:00Z",
"transaction_amount_usd": 16.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1319556.78,
"financial_exposure_usd": 2594623.78,
"recoverable_pct": 0.507
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108135",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-06T15:35:00Z",
"trace_id": "86e00de6-d196-575a-f656-9e3b6ef7f1a7"
} | {
"account_age_days": 1516,
"account_id": "ACCT-DB6875838471",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.941
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 393,
"timestamp": "2026-01-06T12:16:00Z",
"transaction_amount_usd": 2.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2317.08,
"financial_exposure_usd": 3533.35,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102182",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-02T12:22:00Z",
"trace_id": "c85b8b7c-d763-b36b-c7af-bb22fdb1e31b"
} | {
"account_age_days": 1400,
"account_id": "ACCT-7DC2D9AB710A",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_1",
"session_entropy": 0.883
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 861,
"timestamp": "2026-01-02T12:22:00Z",
"transaction_amount_usd": 72982.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.454,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 206807.56,
"financial_exposure_usd": 461925.65,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104691",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-04T06:11:00Z",
"trace_id": "ef2c50d3-a384-57db-cd28-8618be41ba59"
} | {
"account_age_days": 492,
"account_id": "ACCT-C92CE2F2ACA4",
"baseline_risk_score": 0.44,
"kyc_tier": "tier_1",
"session_entropy": 0.457
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 165,
"timestamp": "2026-01-04T06:11:00Z",
"transaction_amount_usd": 1627786.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.563,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1805997.12,
"financial_exposure_usd": 2793119.19,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104069",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "low",
"timestamp": "2026-01-03T19:49:00Z",
"trace_id": "fa3fb1f8-6ca6-662f-f6b6-066bf8f3060e"
} | {
"account_age_days": 756,
"account_id": "ACCT-15D1DCA72E05",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_3",
"session_entropy": 0.216
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 228,
"timestamp": "2026-01-03T19:49:00Z",
"transaction_amount_usd": 2858148.53
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.371,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3647996.37,
"financial_exposure_usd": 3898355.73,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103198",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-03T05:18:00Z",
"trace_id": "860a3860-6fe3-90bf-68a3-326b36468fbe"
} | {
"account_age_days": 812,
"account_id": "ACCT-79F582DCB797",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_2",
"session_entropy": 0.342
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 141,
"timestamp": "2026-01-03T05:18:00Z",
"transaction_amount_usd": 97022.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.776,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 30359.76,
"financial_exposure_usd": 40413.88,
"recoverable_pct": 0.16
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106192",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-05T07:12:00Z",
"trace_id": "b790e0a2-451a-e4d0-c8a5-73c6c95bba98"
} | {
"account_age_days": 1361,
"account_id": "ACCT-F34E74A548F8",
"baseline_risk_score": 0.225,
"kyc_tier": "tier_2",
"session_entropy": 0.8
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 980,
"timestamp": "2026-01-05T07:12:00Z",
"transaction_amount_usd": 2773133.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.84,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3636172.14,
"financial_exposure_usd": 4907276.96,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104274",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "high",
"timestamp": "2026-01-03T23:14:00Z",
"trace_id": "eb772939-e920-ffaf-2665-6731dec6094d"
} | {
"account_age_days": 1592,
"account_id": "ACCT-F779A1D5FB84",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_2",
"session_entropy": 0.458
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 384,
"timestamp": "2026-01-03T23:14:00Z",
"transaction_amount_usd": 2334215.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.792,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4370298.67,
"financial_exposure_usd": 7242535.26,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104207",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "high",
"timestamp": "2026-01-03T22:07:00Z",
"trace_id": "153a8658-98d3-1bff-16b8-8fa312af390f"
} | {
"account_age_days": 1787,
"account_id": "ACCT-02F909ACA193",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 129,
"timestamp": "2026-01-03T18:38:00Z",
"transaction_amount_usd": 11.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.857,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3752352.69,
"financial_exposure_usd": 4729671.55,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106945",
"label": "benign",
"label_confidence": 0.697,
"severity": "medium",
"timestamp": "2026-01-05T19:45:00Z",
"trace_id": "a4d3e93c-d74c-36c4-7b70-e574052fec44"
} | {
"account_age_days": 180,
"account_id": "ACCT-921AE3802C11",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.548
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 107,
"timestamp": "2026-01-05T15:24:00Z",
"transaction_amount_usd": 20.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.651,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 255.6,
"financial_exposure_usd": 503.21,
"recoverable_pct": 0.933
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106446",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-05T11:26:00Z",
"trace_id": "a102253e-60ac-5310-5824-1efafa87433e"
} | {
"account_age_days": 19,
"account_id": "ACCT-DF9B626D67B3",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_3",
"session_entropy": 0.192
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 203,
"timestamp": "2026-01-05T08:02:00Z",
"transaction_amount_usd": 8.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.436,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2049415.69,
"financial_exposure_usd": 4596441.38,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106670",
"label": "benign",
"label_confidence": 0.552,
"severity": "high",
"timestamp": "2026-01-05T15:10:00Z",
"trace_id": "81f16db3-1742-8026-d2e0-0800a7fbd459"
} | {
"account_age_days": 201,
"account_id": "ACCT-7AC5CA58B964",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.381
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 750,
"timestamp": "2026-01-05T15:10:00Z",
"transaction_amount_usd": 5940.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.539,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2015.87,
"financial_exposure_usd": 2390.68,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109739",
"label": "benign",
"label_confidence": 0.478,
"severity": "low",
"timestamp": "2026-01-07T18:19:00Z",
"trace_id": "f38d4b23-c05e-a2c1-4234-614fb358f0f2"
} | {
"account_age_days": 1679,
"account_id": "ACCT-4CC9AAAF1B78",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.281
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 83,
"timestamp": "2026-01-07T18:19:00Z",
"transaction_amount_usd": 13413.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.548,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5748.81,
"financial_exposure_usd": 6639.14,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102511",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "medium",
"timestamp": "2026-01-02T17:51:00Z",
"trace_id": "e410ee2a-02a3-8135-0595-087c9a299da7"
} | {
"account_age_days": 435,
"account_id": "ACCT-6B5F78FDA302",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_2",
"session_entropy": 0.394
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 793,
"timestamp": "2026-01-02T17:51:00Z",
"transaction_amount_usd": 102282.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.695,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 758631.19,
"financial_exposure_usd": 972786.6,
"recoverable_pct": 0.456
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103911",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-03T17:11:00Z",
"trace_id": "4283933d-c3d6-9021-4367-10d645e51c71"
} | {
"account_age_days": 1497,
"account_id": "ACCT-5B11EC7BD371",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 136,
"timestamp": "2026-01-03T15:45:00Z",
"transaction_amount_usd": 10.51
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.65,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5905624.27,
"financial_exposure_usd": 6885288.78,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108641",
"label": "benign",
"label_confidence": 0.708,
"severity": "high",
"timestamp": "2026-01-07T00:01:00Z",
"trace_id": "4182ed71-3435-a668-56cc-ada5693829cf"
} | {
"account_age_days": 1965,
"account_id": "ACCT-45DFC460DC10",
"baseline_risk_score": 0.157,
"kyc_tier": "tier_2",
"session_entropy": 0.874
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 537,
"timestamp": "2026-01-07T00:01:00Z",
"transaction_amount_usd": 1491.47
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1407.98,
"financial_exposure_usd": 1931.31,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105879",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-05T01:59:00Z",
"trace_id": "87c95317-b2d0-1a94-153d-bb0c529d8e93"
} | {
"account_age_days": 1623,
"account_id": "ACCT-A364D4C03321",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_3",
"session_entropy": 0.848
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 921,
"timestamp": "2026-01-05T01:59:00Z",
"transaction_amount_usd": 1423504.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.9,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1302937.56,
"financial_exposure_usd": 2147708.72,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103879",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "low",
"timestamp": "2026-01-03T16:39:00Z",
"trace_id": "19a3d01b-fd37-da08-43fe-c43505317e39"
} | {
"account_age_days": 780,
"account_id": "ACCT-70671DE12CBE",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 163,
"timestamp": "2026-01-03T16:39:00Z",
"transaction_amount_usd": 2490592.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.446,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5045852.13,
"financial_exposure_usd": 5484358.07,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104484",
"label": "fraudulent",
"label_confidence": 0.614,
"severity": "medium",
"timestamp": "2026-01-04T02:44:00Z",
"trace_id": "d296e85d-a258-a9a7-bd30-d14fd2961e08"
} | {
"account_age_days": 477,
"account_id": "ACCT-48A9810558AE",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_2",
"session_entropy": 0.56
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 391,
"timestamp": "2026-01-03T16:36:00Z",
"transaction_amount_usd": 24.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.367,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2566583.31,
"financial_exposure_usd": 5530851.39,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102786",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-02T22:26:00Z",
"trace_id": "048f5c89-50eb-118a-d77f-9254e41d91eb"
} | {
"account_age_days": 627,
"account_id": "ACCT-92BCC2DFA121",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_3",
"session_entropy": 0.507
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 283,
"timestamp": "2026-01-02T17:44:00Z",
"transaction_amount_usd": 0.16
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.909,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 949459.73,
"financial_exposure_usd": 1032654.35,
"recoverable_pct": 0.187
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101675",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "critical",
"timestamp": "2026-01-02T03:55:00Z",
"trace_id": "7505d91d-9df0-46fe-8ec4-8faeee202262"
} | {
"account_age_days": 1074,
"account_id": "ACCT-EC269A93F4C1",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_3",
"session_entropy": 0.849
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1148,
"timestamp": "2026-01-02T03:55:00Z",
"transaction_amount_usd": 97191.33
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.687,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 638829.98,
"financial_exposure_usd": 989985.95,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106199",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-05T07:19:00Z",
"trace_id": "3310f645-f8e7-bd02-fcf8-d3b10db34811"
} | {
"account_age_days": 1342,
"account_id": "ACCT-FF9FBFA1349A",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_3",
"session_entropy": 0.283
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 297,
"timestamp": "2026-01-05T07:19:00Z",
"transaction_amount_usd": 1050646.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2700708.22,
"financial_exposure_usd": 4574308.13,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102819",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-02T22:59:00Z",
"trace_id": "e3de51b3-15a7-6dfa-70ce-4d5b851783c0"
} | {
"account_age_days": 613,
"account_id": "ACCT-D112EC121267",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_3",
"session_entropy": 0.221
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 974,
"timestamp": "2026-01-02T22:59:00Z",
"transaction_amount_usd": 69610.5
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 707263.82,
"financial_exposure_usd": 1055961.77,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109624",
"label": "benign",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-07T16:24:00Z",
"trace_id": "55e80df8-cb4c-9e68-03ab-6f3a7c55fcbc"
} | {
"account_age_days": 1873,
"account_id": "ACCT-057A2B759180",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.421
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1185,
"timestamp": "2026-01-07T16:24:00Z",
"transaction_amount_usd": 9021.82
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.505,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1669.93,
"financial_exposure_usd": 3335.03,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106143",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "critical",
"timestamp": "2026-01-05T06:23:00Z",
"trace_id": "2fad35f2-b68d-5a74-5b12-14a27a363c9a"
} | {
"account_age_days": 1770,
"account_id": "ACCT-0D2C49460396",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.527
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 238,
"timestamp": "2026-01-05T06:23:00Z",
"transaction_amount_usd": 1974695.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3099805.72,
"financial_exposure_usd": 3147608.17,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102646",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-02T20:06:00Z",
"trace_id": "925a0c4e-44fb-a40e-371f-be24d0dfa41d"
} | {
"account_age_days": 537,
"account_id": "ACCT-CAA9F7079916",
"baseline_risk_score": 0.501,
"kyc_tier": "tier_2",
"session_entropy": 0.811
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1159,
"timestamp": "2026-01-02T20:06:00Z",
"transaction_amount_usd": 61828.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.682,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 750301.54,
"financial_exposure_usd": 1138638.19,
"recoverable_pct": 0.085
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100420",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "critical",
"timestamp": "2026-01-01T07:00:00Z",
"trace_id": "9c8339b9-1c91-5117-e300-1ec44f88c1ed"
} | {
"account_age_days": 820,
"account_id": "ACCT-CB6851685FEE",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_2",
"session_entropy": 0.849
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 182,
"timestamp": "2026-01-01T07:00:00Z",
"transaction_amount_usd": 72062.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.413,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 79665.55,
"financial_exposure_usd": 133716.93,
"recoverable_pct": 0.232
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101360",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "medium",
"timestamp": "2026-01-01T22:40:00Z",
"trace_id": "5e670e48-35e4-dee2-d55b-5b4c87676072"
} | {
"account_age_days": 1672,
"account_id": "ACCT-0C22474B4811",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_3",
"session_entropy": 0.192
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 511,
"timestamp": "2026-01-01T22:40:00Z",
"transaction_amount_usd": 70767.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.588,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 454143.24,
"financial_exposure_usd": 680524.4,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100346",
"label": "fraudulent",
"label_confidence": 0.824,
"severity": "high",
"timestamp": "2026-01-01T05:46:00Z",
"trace_id": "5a0763a1-449a-a284-1415-c20e58dc6a99"
} | {
"account_age_days": 785,
"account_id": "ACCT-172DD3CE5683",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_2",
"session_entropy": 0.925
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 340,
"timestamp": "2025-12-31T22:06:00Z",
"transaction_amount_usd": 1.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.776,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 300185,
"financial_exposure_usd": 326227.41,
"recoverable_pct": 0.614
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103864",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "high",
"timestamp": "2026-01-03T16:24:00Z",
"trace_id": "36e55cfc-e6e6-a7b1-95f3-6d78928b34a7"
} | {
"account_age_days": 1602,
"account_id": "ACCT-917341712089",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.266
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 908,
"timestamp": "2026-01-03T16:24:00Z",
"transaction_amount_usd": 218509.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3627020.82,
"financial_exposure_usd": 3794007.09,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101835",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "low",
"timestamp": "2026-01-02T06:35:00Z",
"trace_id": "7dcbf357-c561-b266-0edf-66e5ca932312"
} | {
"account_age_days": 606,
"account_id": "ACCT-E993C899A13A",
"baseline_risk_score": 0.509,
"kyc_tier": "tier_1",
"session_entropy": 0.147
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 213,
"timestamp": "2026-01-02T05:25:00Z",
"transaction_amount_usd": 10.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.87,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 345605.59,
"financial_exposure_usd": 758531.7,
"recoverable_pct": 0.189
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100854",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-01T14:14:00Z",
"trace_id": "dfa0a797-2a8b-78ed-12ab-2276c3377ad3"
} | {
"account_age_days": 579,
"account_id": "ACCT-70D002C62130",
"baseline_risk_score": 0.482,
"kyc_tier": "tier_3",
"session_entropy": 0.443
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 214,
"timestamp": "2026-01-01T14:14:00Z",
"transaction_amount_usd": 41428.62
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.419,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 456446.52,
"financial_exposure_usd": 866225.94,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103479",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "low",
"timestamp": "2026-01-03T09:59:00Z",
"trace_id": "e6dd7ba0-9d7d-246c-cbba-9f8f97598eda"
} | {
"account_age_days": 624,
"account_id": "ACCT-51DA57C97C73",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_3",
"session_entropy": 0.821
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 434,
"timestamp": "2026-01-03T09:59:00Z",
"transaction_amount_usd": 1799491.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 619175.75,
"financial_exposure_usd": 1449382.74,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107354",
"label": "benign",
"label_confidence": 0.6,
"severity": "high",
"timestamp": "2026-01-06T02:34:00Z",
"trace_id": "9288f9f5-b290-d700-e399-0c8486f8f4f9"
} | {
"account_age_days": 876,
"account_id": "ACCT-F4389A2AA0A7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.154
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 331,
"timestamp": "2026-01-05T14:38:00Z",
"transaction_amount_usd": 13.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1469.72,
"financial_exposure_usd": 2182.98,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106494",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-05T12:14:00Z",
"trace_id": "5aefb16b-166b-cdc7-237d-541c06fd0022"
} | {
"account_age_days": 967,
"account_id": "ACCT-471EBFDD10EC",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_3",
"session_entropy": 0.858
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 218,
"timestamp": "2026-01-05T12:14:00Z",
"transaction_amount_usd": 1693177.5
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.673,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1857471.09,
"financial_exposure_usd": 3003467.37,
"recoverable_pct": 0.701
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104089",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "medium",
"timestamp": "2026-01-03T20:09:00Z",
"trace_id": "166170df-f1e9-fb13-a5c9-9d954faa6717"
} | {
"account_age_days": 269,
"account_id": "ACCT-174224EB7E0D",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_2",
"session_entropy": 0.379
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1098,
"timestamp": "2026-01-03T20:09:00Z",
"transaction_amount_usd": 2657293.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.477,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4961724.4,
"financial_exposure_usd": 4974141.12,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102031",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-02T09:51:00Z",
"trace_id": "ceaca75b-ae93-e4aa-ed6b-2a47d0146f98"
} | {
"account_age_days": 457,
"account_id": "ACCT-8427C880D41F",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_2",
"session_entropy": 0.636
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 327,
"timestamp": "2026-01-02T09:51:00Z",
"transaction_amount_usd": 45331.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.899,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1030181.81,
"financial_exposure_usd": 1121967.76,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106051",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "high",
"timestamp": "2026-01-05T04:51:00Z",
"trace_id": "61641805-0d13-2082-a61b-0767560deffd"
} | {
"account_age_days": 1770,
"account_id": "ACCT-CBDDA0FF31DE",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_2",
"session_entropy": 0.242
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 426,
"timestamp": "2026-01-05T04:51:00Z",
"transaction_amount_usd": 966949.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.462,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3972134.57,
"financial_exposure_usd": 3986167.89,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100204",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-01T03:24:00Z",
"trace_id": "30604ccf-f979-549b-c44c-5c7880ed319c"
} | {
"account_age_days": 978,
"account_id": "ACCT-A61BDC7D0511",
"baseline_risk_score": 0.555,
"kyc_tier": "tier_3",
"session_entropy": 0.8
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 593,
"timestamp": "2026-01-01T03:24:00Z",
"transaction_amount_usd": 5729.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.519,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 347628.83,
"financial_exposure_usd": 519001.81,
"recoverable_pct": 0.636
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101849",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "critical",
"timestamp": "2026-01-02T06:49:00Z",
"trace_id": "4601b3e6-d6e5-4cd1-5efa-5c3e25db68b2"
} | {
"account_age_days": 1663,
"account_id": "ACCT-5450F9D80618",
"baseline_risk_score": 0.639,
"kyc_tier": "tier_3",
"session_entropy": 0.6
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 1007,
"timestamp": "2026-01-02T06:49:00Z",
"transaction_amount_usd": 44262.13
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.734,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 305971.85,
"financial_exposure_usd": 436785.85,
"recoverable_pct": 0.244
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107589",
"label": "benign",
"label_confidence": 0.452,
"severity": "low",
"timestamp": "2026-01-06T06:29:00Z",
"trace_id": "0cd22aa7-caa8-ffc8-9227-423b2fe72e48"
} | {
"account_age_days": 506,
"account_id": "ACCT-3F51CA720369",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.27
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 329,
"timestamp": "2026-01-06T06:29:00Z",
"transaction_amount_usd": 1476.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 395.31,
"financial_exposure_usd": 852.28,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106325",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "high",
"timestamp": "2026-01-05T09:25:00Z",
"trace_id": "a75405f3-eece-d694-2daf-7fc8656138c2"
} | {
"account_age_days": 556,
"account_id": "ACCT-FA53603B9AF6",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_2",
"session_entropy": 0.339
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 466,
"timestamp": "2026-01-05T09:25:00Z",
"transaction_amount_usd": 2439346.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.942,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3621164.68,
"financial_exposure_usd": 4172255.93,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109161",
"label": "benign",
"label_confidence": 0.626,
"severity": "low",
"timestamp": "2026-01-07T08:41:00Z",
"trace_id": "9258a57e-4209-e749-de54-5e8ed3a96ce2"
} | {
"account_age_days": 1919,
"account_id": "ACCT-6E0D0F702FEB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.272
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1003,
"timestamp": "2026-01-07T08:41:00Z",
"transaction_amount_usd": 4388.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.56,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1031.33,
"financial_exposure_usd": 1871.17,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101624",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "low",
"timestamp": "2026-01-02T03:04:00Z",
"trace_id": "7333e93c-d40a-cd35-8847-30448493a3ad"
} | {
"account_age_days": 470,
"account_id": "ACCT-E1D931B4C961",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_2",
"session_entropy": 0.733
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 885,
"timestamp": "2026-01-02T03:04:00Z",
"transaction_amount_usd": 69169.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.41,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 699486.42,
"financial_exposure_usd": 950385.41,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104200",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-03T22:00:00Z",
"trace_id": "082fd3a1-5323-afd9-ca38-7923cfe8b667"
} | {
"account_age_days": 1510,
"account_id": "ACCT-FD7917480801",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_1",
"session_entropy": 0.804
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 82,
"timestamp": "2026-01-03T14:34:00Z",
"transaction_amount_usd": 21.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.891,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2967573.66,
"financial_exposure_usd": 4979051.95,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101084",
"label": "fraudulent",
"label_confidence": 0.9,
"severity": "critical",
"timestamp": "2026-01-01T18:04:00Z",
"trace_id": "7b3d50aa-262d-adb4-7f03-f00e7096304c"
} | {
"account_age_days": 21,
"account_id": "ACCT-31CD47A6CC85",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.438
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1075,
"timestamp": "2026-01-01T18:04:00Z",
"transaction_amount_usd": 77033.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.726,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 711374.61,
"financial_exposure_usd": 794395.9,
"recoverable_pct": 0.282
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106952",
"label": "benign",
"label_confidence": 0.59,
"severity": "medium",
"timestamp": "2026-01-05T19:52:00Z",
"trace_id": "9adacca2-534b-d006-854f-dc4ef16bd855"
} | {
"account_age_days": 1270,
"account_id": "ACCT-DDB3E2E2F8E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.189
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 321,
"timestamp": "2026-01-05T11:48:00Z",
"transaction_amount_usd": 19.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.642,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 470.01,
"financial_exposure_usd": 869.19,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101586",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-02T02:26:00Z",
"trace_id": "08d93dba-11a2-b599-f42d-59adfbff7b7d"
} | {
"account_age_days": 129,
"account_id": "ACCT-817006F46898",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.376
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 825,
"timestamp": "2026-01-02T02:26:00Z",
"transaction_amount_usd": 72411.84
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.861,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 820869.81,
"financial_exposure_usd": 1203451.62,
"recoverable_pct": 0.12
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103761",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "high",
"timestamp": "2026-01-03T14:41:00Z",
"trace_id": "6c3fe881-db7f-ad83-8786-ad823ba2e189"
} | {
"account_age_days": 1514,
"account_id": "ACCT-52C3972ECA9E",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_2",
"session_entropy": 0.567
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 184,
"timestamp": "2026-01-03T10:29:00Z",
"transaction_amount_usd": 2.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.624,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1653860.68,
"financial_exposure_usd": 4109548.19,
"recoverable_pct": 0.632
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100952",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "critical",
"timestamp": "2026-01-01T15:52:00Z",
"trace_id": "e8d79f0f-4740-cf17-f489-3bc0b9f1818e"
} | {
"account_age_days": 1433,
"account_id": "ACCT-0990DB064676",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.207
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 260,
"timestamp": "2026-01-01T15:19:00Z",
"transaction_amount_usd": 2.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 392814.64,
"financial_exposure_usd": 483133.63,
"recoverable_pct": 0.037
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101685",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-02T04:05:00Z",
"trace_id": "16989fa2-2d43-8291-bb13-8703ec4c8c42"
} | {
"account_age_days": 365,
"account_id": "ACCT-C398665B06ED",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_2",
"session_entropy": 0.693
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 158,
"timestamp": "2026-01-02T01:32:00Z",
"transaction_amount_usd": 24.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.665,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 385964.12,
"financial_exposure_usd": 731677.21,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100404",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "low",
"timestamp": "2026-01-01T06:44:00Z",
"trace_id": "e50ebfaf-0238-a72d-3e0b-66229a6544ea"
} | {
"account_age_days": 846,
"account_id": "ACCT-CF8DDCD63AC2",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_3",
"session_entropy": 0.788
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 957,
"timestamp": "2026-01-01T06:44:00Z",
"transaction_amount_usd": 62797.31
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.461,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 122396.53,
"financial_exposure_usd": 185357.26,
"recoverable_pct": 0.262
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109819",
"label": "benign",
"label_confidence": 0.457,
"severity": "low",
"timestamp": "2026-01-07T19:39:00Z",
"trace_id": "6f9b65cc-d4b8-d7b9-5bbf-420133081ddf"
} | {
"account_age_days": 579,
"account_id": "ACCT-0E2CFCD1B8BE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.162
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 420,
"timestamp": "2026-01-07T19:39:00Z",
"transaction_amount_usd": 6720.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1729.08,
"financial_exposure_usd": 2826.08,
"recoverable_pct": 0.981
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108352",
"label": "benign",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-06T19:12:00Z",
"trace_id": "5668a86e-b464-90b6-b2be-39a807f399c8"
} | {
"account_age_days": 1918,
"account_id": "ACCT-9D9E8E54405C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.857
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 751,
"timestamp": "2026-01-06T19:12:00Z",
"transaction_amount_usd": 11693.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.795,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1642.51,
"financial_exposure_usd": 2193.21,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101088",
"label": "fraudulent",
"label_confidence": 0.886,
"severity": "high",
"timestamp": "2026-01-01T18:08:00Z",
"trace_id": "aea8fc8e-8333-13bb-6177-b7a3f09faaab"
} | {
"account_age_days": 1153,
"account_id": "ACCT-C41BAD6A706A",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.393
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 227,
"timestamp": "2026-01-01T11:45:00Z",
"transaction_amount_usd": 1.42
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.8,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 258557.57,
"financial_exposure_usd": 441249.48,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103235",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "critical",
"timestamp": "2026-01-03T05:55:00Z",
"trace_id": "36e99f51-55be-4422-a797-3daa8d764411"
} | {
"account_age_days": 367,
"account_id": "ACCT-1E2363CAC027",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.93
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 319,
"timestamp": "2026-01-03T05:55:00Z",
"transaction_amount_usd": 105323.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.503,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 100100.68,
"financial_exposure_usd": 223327.39,
"recoverable_pct": 0.389
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107071",
"label": "benign",
"label_confidence": 0.464,
"severity": "low",
"timestamp": "2026-01-05T21:51:00Z",
"trace_id": "06637d0e-b088-3226-6a25-d7e0ffa3c496"
} | {
"account_age_days": 563,
"account_id": "ACCT-064C84523BF3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 639,
"timestamp": "2026-01-05T21:51:00Z",
"transaction_amount_usd": 11371.19
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.741,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2883.16,
"financial_exposure_usd": 6520.48,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109145",
"label": "benign",
"label_confidence": 0.534,
"severity": "critical",
"timestamp": "2026-01-07T08:25:00Z",
"trace_id": "306eae92-87d4-d43a-173d-5530b8f7706e"
} | {
"account_age_days": 1164,
"account_id": "ACCT-C490EB1F00C3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.306
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 155,
"timestamp": "2026-01-06T22:58:00Z",
"transaction_amount_usd": 21.73
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.704,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1552.64,
"financial_exposure_usd": 1586.68,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101962",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-02T08:42:00Z",
"trace_id": "0a130a4f-a4a9-4aae-2912-4ec8da4419b4"
} | {
"account_age_days": 481,
"account_id": "ACCT-F7BB5E623BBD",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_2",
"session_entropy": 0.722
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 287,
"timestamp": "2026-01-02T03:18:00Z",
"transaction_amount_usd": 24.16
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.933,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 377348.73,
"financial_exposure_usd": 411903.32,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109212",
"label": "benign",
"label_confidence": 0.489,
"severity": "medium",
"timestamp": "2026-01-07T09:32:00Z",
"trace_id": "8b1c7d2d-68e9-e9b0-fa1a-31c9abe578d2"
} | {
"account_age_days": 857,
"account_id": "ACCT-489F4DED3E6A",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 826,
"timestamp": "2026-01-07T09:32:00Z",
"transaction_amount_usd": 9724.13
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3685.63,
"financial_exposure_usd": 4690.31,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108152",
"label": "benign",
"label_confidence": 0.736,
"severity": "high",
"timestamp": "2026-01-06T15:52:00Z",
"trace_id": "40299920-669e-206b-fc54-d1add78a436a"
} | {
"account_age_days": 1263,
"account_id": "ACCT-6E5F23728286",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.157
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 204,
"timestamp": "2026-01-06T14:34:00Z",
"transaction_amount_usd": 11.42
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 273.84,
"financial_exposure_usd": 667.27,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106744",
"label": "benign",
"label_confidence": 0.61,
"severity": "critical",
"timestamp": "2026-01-05T16:24:00Z",
"trace_id": "d4cdb979-51cc-1a52-f985-834a60a6d56f"
} | {
"account_age_days": 826,
"account_id": "ACCT-7F84AEEF70E7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.919
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 398,
"timestamp": "2026-01-05T11:51:00Z",
"transaction_amount_usd": 12.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2042.9,
"financial_exposure_usd": 3181.94,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107885",
"label": "benign",
"label_confidence": 0.694,
"severity": "low",
"timestamp": "2026-01-06T11:25:00Z",
"trace_id": "3fd5d982-5fa1-ebdc-cd57-b0f98d4a4acb"
} | {
"account_age_days": 509,
"account_id": "ACCT-90F4791E139C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.811
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 268,
"timestamp": "2026-01-06T04:34:00Z",
"transaction_amount_usd": 19.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4130.22,
"financial_exposure_usd": 5031.29,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109857",
"label": "benign",
"label_confidence": 0.534,
"severity": "medium",
"timestamp": "2026-01-07T20:17:00Z",
"trace_id": "2efa48e2-01ad-c635-fcba-7f99d4423b37"
} | {
"account_age_days": 1240,
"account_id": "ACCT-33F31429860E",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_1",
"session_entropy": 0.878
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 144,
"timestamp": "2026-01-07T20:17:00Z",
"transaction_amount_usd": 10202.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2902.95,
"financial_exposure_usd": 3638.39,
"recoverable_pct": 0.542
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103787",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "low",
"timestamp": "2026-01-03T15:07:00Z",
"trace_id": "b0e82c29-62e5-7e3d-6ac7-cdb6bd112b62"
} | {
"account_age_days": 1599,
"account_id": "ACCT-278722261F3F",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_1",
"session_entropy": 0.169
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 232,
"timestamp": "2026-01-03T08:10:00Z",
"transaction_amount_usd": 15.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4363741.31,
"financial_exposure_usd": 4718744.15,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.