schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104713",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "low",
"timestamp": "2026-01-04T06:33:00Z",
"trace_id": "dffdaa94-edd1-eaa5-b601-f85cf961adc2"
} | {
"account_age_days": 1403,
"account_id": "ACCT-4C06938094A8",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 237,
"timestamp": "2026-01-04T06:33:00Z",
"transaction_amount_usd": 1197597.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5193695.4,
"financial_exposure_usd": 6358337.98,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102438",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "critical",
"timestamp": "2026-01-02T16:38:00Z",
"trace_id": "f98e0ea6-1495-71b8-ac8d-30d31919cd7d"
} | {
"account_age_days": 209,
"account_id": "ACCT-4856F011A844",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_2",
"session_entropy": 0.177
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 104,
"timestamp": "2026-01-02T16:38:00Z",
"transaction_amount_usd": 68796.33
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.464,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 346582.37,
"financial_exposure_usd": 649372.51,
"recoverable_pct": 0.374
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109170",
"label": "benign",
"label_confidence": 0.545,
"severity": "medium",
"timestamp": "2026-01-07T08:50:00Z",
"trace_id": "d314446c-70e3-7f1e-c97c-99fa9e703c14"
} | {
"account_age_days": 1891,
"account_id": "ACCT-CD2D43C1DC40",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_3",
"session_entropy": 0.297
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 432,
"timestamp": "2026-01-07T08:50:00Z",
"transaction_amount_usd": 2825.52
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2219.25,
"financial_exposure_usd": 2456.63,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100735",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "high",
"timestamp": "2026-01-01T12:15:00Z",
"trace_id": "5b2ea9d6-c7ea-f180-f2e5-205ba87d56c7"
} | {
"account_age_days": 1046,
"account_id": "ACCT-4D65FBEFD72C",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_3",
"session_entropy": 0.388
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 84,
"timestamp": "2026-01-01T00:21:00Z",
"transaction_amount_usd": 22.11
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.777,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 34709.6,
"financial_exposure_usd": 51992.54,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101799",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "high",
"timestamp": "2026-01-02T05:59:00Z",
"trace_id": "7881b7e1-f9ae-b4f0-6a8e-c3b834cb1e99"
} | {
"account_age_days": 203,
"account_id": "ACCT-A52E26F43169",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_1",
"session_entropy": 0.79
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 238,
"timestamp": "2026-01-02T05:59:00Z",
"transaction_amount_usd": 55433.9
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.723,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 344503.97,
"financial_exposure_usd": 708909.9,
"recoverable_pct": 0.019
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100242",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "high",
"timestamp": "2026-01-01T04:02:00Z",
"trace_id": "7846e9c5-15a8-cb98-ab2d-96a005f4a2d0"
} | {
"account_age_days": 446,
"account_id": "ACCT-ADC4B86DA180",
"baseline_risk_score": 0.493,
"kyc_tier": "tier_1",
"session_entropy": 0.268
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 1166,
"timestamp": "2026-01-01T04:02:00Z",
"transaction_amount_usd": 95155.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.736,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 283982.5,
"financial_exposure_usd": 670518.55,
"recoverable_pct": 0.346
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107138",
"label": "benign",
"label_confidence": 0.49,
"severity": "medium",
"timestamp": "2026-01-05T22:58:00Z",
"trace_id": "d3c51959-1838-85c1-e3b8-a71b0e179a06"
} | {
"account_age_days": 1622,
"account_id": "ACCT-BAEC99DFCB96",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_2",
"session_entropy": 0.683
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 198,
"timestamp": "2026-01-05T22:05:00Z",
"transaction_amount_usd": 23.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1781.53,
"financial_exposure_usd": 3544.67,
"recoverable_pct": 0.931
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106757",
"label": "benign",
"label_confidence": 0.656,
"severity": "low",
"timestamp": "2026-01-05T16:37:00Z",
"trace_id": "fc83d93d-17d5-fe18-48ab-f5ef6504e925"
} | {
"account_age_days": 785,
"account_id": "ACCT-C8F683B6481D",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.341
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 120,
"timestamp": "2026-01-05T16:37:00Z",
"transaction_amount_usd": 1725.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 844.79,
"financial_exposure_usd": 1867.43,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105168",
"label": "fraudulent",
"label_confidence": 0.684,
"severity": "medium",
"timestamp": "2026-01-04T14:08:00Z",
"trace_id": "58315d57-1e95-f6b2-cd3c-31066793946a"
} | {
"account_age_days": 1967,
"account_id": "ACCT-569085BA60B6",
"baseline_risk_score": 0.431,
"kyc_tier": "tier_3",
"session_entropy": 0.829
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1027,
"timestamp": "2026-01-04T14:08:00Z",
"transaction_amount_usd": 1317361.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.79,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1577098.29,
"financial_exposure_usd": 3488334.9,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105217",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "medium",
"timestamp": "2026-01-04T14:57:00Z",
"trace_id": "2e8c3808-f92f-20f9-2e11-cc58f4eb34e1"
} | {
"account_age_days": 794,
"account_id": "ACCT-DF38BD285020",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_2",
"session_entropy": 0.928
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 129,
"timestamp": "2026-01-04T06:51:00Z",
"transaction_amount_usd": 5.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 821097.71,
"financial_exposure_usd": 842357.4,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105554",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-04T20:34:00Z",
"trace_id": "f7ddc69e-2d3e-8845-e77a-10fd98087742"
} | {
"account_age_days": 977,
"account_id": "ACCT-0C5932D46A21",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_1",
"session_entropy": 0.203
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1079,
"timestamp": "2026-01-04T20:34:00Z",
"transaction_amount_usd": 1053170.83
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.809,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2128510.18,
"financial_exposure_usd": 4183638.7,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100287",
"label": "fraudulent",
"label_confidence": 0.83,
"severity": "medium",
"timestamp": "2026-01-01T04:47:00Z",
"trace_id": "38f9faed-25c8-5224-d202-d65bbdf1de53"
} | {
"account_age_days": 1859,
"account_id": "ACCT-C68B751F84A2",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_3",
"session_entropy": 0.432
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 465,
"timestamp": "2026-01-01T04:47:00Z",
"transaction_amount_usd": 16280.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.711,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 738117.74,
"financial_exposure_usd": 990272.8,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107322",
"label": "benign",
"label_confidence": 0.589,
"severity": "low",
"timestamp": "2026-01-06T02:02:00Z",
"trace_id": "ce431dab-9db2-b403-5f57-392f41af35c5"
} | {
"account_age_days": 630,
"account_id": "ACCT-72E46B817F57",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.733
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 175,
"timestamp": "2026-01-06T02:02:00Z",
"transaction_amount_usd": 659.84
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1224.85,
"financial_exposure_usd": 1567.9,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108775",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-07T02:15:00Z",
"trace_id": "13e110e7-b803-fb45-4dfe-bbeae9f78db5"
} | {
"account_age_days": 1884,
"account_id": "ACCT-F783B54E123B",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.41
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 393,
"timestamp": "2026-01-06T14:43:00Z",
"transaction_amount_usd": 19.41
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.702,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1516.67,
"financial_exposure_usd": 2048.06,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101713",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "critical",
"timestamp": "2026-01-02T04:33:00Z",
"trace_id": "41b831a4-81d4-db23-98b2-a04f2f4517cd"
} | {
"account_age_days": 186,
"account_id": "ACCT-4A94D562A58B",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_2",
"session_entropy": 0.471
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 324,
"timestamp": "2026-01-02T04:33:00Z",
"transaction_amount_usd": 1157.96
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.873,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 719453.15,
"financial_exposure_usd": 1080683.47,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107095",
"label": "benign",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-05T22:15:00Z",
"trace_id": "05b334cc-7b3b-1be2-429c-14791d768acf"
} | {
"account_age_days": 922,
"account_id": "ACCT-E449E009169B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.729
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 690,
"timestamp": "2026-01-05T22:15:00Z",
"transaction_amount_usd": 5656.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.666,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6870.99,
"financial_exposure_usd": 6985.46,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107710",
"label": "benign",
"label_confidence": 0.461,
"severity": "medium",
"timestamp": "2026-01-06T08:30:00Z",
"trace_id": "d498708f-8fb6-4c7c-1a02-dff549eb3264"
} | {
"account_age_days": 1159,
"account_id": "ACCT-F7EB61E374FB",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_1",
"session_entropy": 0.123
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 479,
"timestamp": "2026-01-06T08:30:00Z",
"transaction_amount_usd": 11077.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2668.87,
"financial_exposure_usd": 4996.7,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109814",
"label": "benign",
"label_confidence": 0.619,
"severity": "low",
"timestamp": "2026-01-07T19:34:00Z",
"trace_id": "76cdb5be-193d-1935-86cb-4a65dfaed290"
} | {
"account_age_days": 903,
"account_id": "ACCT-3789F1A027D9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.734
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 251,
"timestamp": "2026-01-07T15:10:00Z",
"transaction_amount_usd": 12.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 730.88,
"financial_exposure_usd": 782.28,
"recoverable_pct": 0.833
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106883",
"label": "benign",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-05T18:43:00Z",
"trace_id": "5c268272-950d-56dc-ffdb-27f202aeb6b0"
} | {
"account_age_days": 1925,
"account_id": "ACCT-B54DC62E5ABA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 435,
"timestamp": "2026-01-05T18:43:00Z",
"transaction_amount_usd": 3216.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.72,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 793.86,
"financial_exposure_usd": 814.61,
"recoverable_pct": 0.906
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109462",
"label": "benign",
"label_confidence": 0.748,
"severity": "low",
"timestamp": "2026-01-07T13:42:00Z",
"trace_id": "66d62e66-1d5b-54ce-e721-f76fee8af377"
} | {
"account_age_days": 1107,
"account_id": "ACCT-3C0ACA65AF90",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_2",
"session_entropy": 0.136
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 497,
"timestamp": "2026-01-07T13:42:00Z",
"transaction_amount_usd": 3272.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1514.86,
"financial_exposure_usd": 1761.4,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100598",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-01T09:58:00Z",
"trace_id": "5c2e6d35-20ce-5ad0-4380-61a52249655d"
} | {
"account_age_days": 1996,
"account_id": "ACCT-0DF85499A393",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_2",
"session_entropy": 0.228
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 774,
"timestamp": "2026-01-01T09:58:00Z",
"transaction_amount_usd": 92510.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.594,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1121371.1,
"financial_exposure_usd": 1354946.3,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102557",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "critical",
"timestamp": "2026-01-02T18:37:00Z",
"trace_id": "870dc0a4-040f-8bd1-b6e8-09bc3227e4ee"
} | {
"account_age_days": 941,
"account_id": "ACCT-46B6D2CBC3DA",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_1",
"session_entropy": 0.426
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1154,
"timestamp": "2026-01-02T18:37:00Z",
"transaction_amount_usd": 40613.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.473,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 972607.27,
"financial_exposure_usd": 1119142.71,
"recoverable_pct": 0.065
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106884",
"label": "benign",
"label_confidence": 0.713,
"severity": "low",
"timestamp": "2026-01-05T18:44:00Z",
"trace_id": "e7f24b62-904f-07da-24f4-b3fa21b688ed"
} | {
"account_age_days": 18,
"account_id": "ACCT-F9884F3C15F0",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_3",
"session_entropy": 0.385
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 809,
"timestamp": "2026-01-05T18:44:00Z",
"transaction_amount_usd": 9487.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2091.92,
"financial_exposure_usd": 2463.25,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102510",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "critical",
"timestamp": "2026-01-02T17:50:00Z",
"trace_id": "2d2bcc74-6025-57fd-4a02-92f90d18a575"
} | {
"account_age_days": 75,
"account_id": "ACCT-B449E2B82AA1",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.375
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 548,
"timestamp": "2026-01-02T17:50:00Z",
"transaction_amount_usd": 51983.08
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.468,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 15046.11,
"financial_exposure_usd": 34972.47,
"recoverable_pct": 0.006
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109511",
"label": "benign",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-07T14:31:00Z",
"trace_id": "f361c0a3-166c-1a52-3f22-f1d62a82b665"
} | {
"account_age_days": 1534,
"account_id": "ACCT-A0C65D3FC08F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.293
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 86,
"timestamp": "2026-01-07T14:31:00Z",
"transaction_amount_usd": 9027.98
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.46,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1998.93,
"financial_exposure_usd": 2168.77,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109734",
"label": "benign",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-07T18:14:00Z",
"trace_id": "f414dc2b-4e8d-a891-3713-58311ab1ac7d"
} | {
"account_age_days": 1112,
"account_id": "ACCT-96602C00EB78",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.563
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 951,
"timestamp": "2026-01-07T18:14:00Z",
"transaction_amount_usd": 5982.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1878.08,
"financial_exposure_usd": 1879.02,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107312",
"label": "benign",
"label_confidence": 0.539,
"severity": "high",
"timestamp": "2026-01-06T01:52:00Z",
"trace_id": "c8cf4b7d-68f3-9ba2-8540-bcf51eca99a8"
} | {
"account_age_days": 1745,
"account_id": "ACCT-200E34958682",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.314
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 190,
"timestamp": "2026-01-05T22:51:00Z",
"transaction_amount_usd": 10.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.696,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3519.59,
"financial_exposure_usd": 6529.83,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102989",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "critical",
"timestamp": "2026-01-03T01:49:00Z",
"trace_id": "49351d4a-d704-9deb-4e7e-f0bf10931c89"
} | {
"account_age_days": 866,
"account_id": "ACCT-DD737409FB65",
"baseline_risk_score": 0.496,
"kyc_tier": "tier_2",
"session_entropy": 0.875
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1005,
"timestamp": "2026-01-03T01:49:00Z",
"transaction_amount_usd": 61580.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.829,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 660360.53,
"financial_exposure_usd": 1183736.23,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109910",
"label": "benign",
"label_confidence": 0.643,
"severity": "low",
"timestamp": "2026-01-07T21:10:00Z",
"trace_id": "3fa09f4d-e31d-575c-e477-4528c52245e6"
} | {
"account_age_days": 425,
"account_id": "ACCT-E1896592A0E3",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_1",
"session_entropy": 0.938
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 351,
"timestamp": "2026-01-07T19:49:00Z",
"transaction_amount_usd": 15.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.516,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 847.71,
"financial_exposure_usd": 1022.64,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102607",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "low",
"timestamp": "2026-01-02T19:27:00Z",
"trace_id": "e92ae03e-09e9-e84e-bfe4-bc5a9fde3bb0"
} | {
"account_age_days": 549,
"account_id": "ACCT-438E8F8879BB",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_3",
"session_entropy": 0.288
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 148,
"timestamp": "2026-01-02T19:27:00Z",
"transaction_amount_usd": 94756.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 97434.27,
"financial_exposure_usd": 197003.68,
"recoverable_pct": 0.036
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100307",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "high",
"timestamp": "2026-01-01T05:07:00Z",
"trace_id": "67f4df95-19f5-8e82-5008-606fdbf5aafe"
} | {
"account_age_days": 79,
"account_id": "ACCT-2EA5F54BFAFB",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_3",
"session_entropy": 0.463
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 192,
"timestamp": "2026-01-01T05:07:00Z",
"transaction_amount_usd": 39659.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 806114.81,
"financial_exposure_usd": 908553.25,
"recoverable_pct": 0.473
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104103",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-03T20:23:00Z",
"trace_id": "f5f001b7-2fe5-1cde-a346-af2372f5f996"
} | {
"account_age_days": 941,
"account_id": "ACCT-D623D7C17AC3",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_1",
"session_entropy": 0.931
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 303,
"timestamp": "2026-01-03T09:01:00Z",
"transaction_amount_usd": 19.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3026218.22,
"financial_exposure_usd": 4112665.83,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105544",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "high",
"timestamp": "2026-01-04T20:24:00Z",
"trace_id": "e2d2f56a-6d0a-ea67-84e0-218f490f8e08"
} | {
"account_age_days": 1954,
"account_id": "ACCT-84F680588F91",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_3",
"session_entropy": 0.199
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 762,
"timestamp": "2026-01-04T20:24:00Z",
"transaction_amount_usd": 2350917.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3148863.49,
"financial_exposure_usd": 3651778.74,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101756",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "critical",
"timestamp": "2026-01-02T05:16:00Z",
"trace_id": "ad6bc71a-d25d-dfed-c708-01b8d8f3fc79"
} | {
"account_age_days": 1469,
"account_id": "ACCT-B8D4D87A0116",
"baseline_risk_score": 0.64,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 291,
"timestamp": "2026-01-01T18:40:00Z",
"transaction_amount_usd": 3.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.89,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 508759.81,
"financial_exposure_usd": 589167.59,
"recoverable_pct": 0.362
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104644",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "high",
"timestamp": "2026-01-04T05:24:00Z",
"trace_id": "88fb1ab8-76dc-8928-329b-1350939775b2"
} | {
"account_age_days": 95,
"account_id": "ACCT-B4D0FE5746AE",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_2",
"session_entropy": 0.191
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 921,
"timestamp": "2026-01-04T05:24:00Z",
"transaction_amount_usd": 2902051.09
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.595,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2124371.82,
"financial_exposure_usd": 3991122.71,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103805",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "low",
"timestamp": "2026-01-03T15:25:00Z",
"trace_id": "d0f9c8e4-c4e3-8f34-a705-091020f3cd67"
} | {
"account_age_days": 114,
"account_id": "ACCT-18B1B712A033",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.716
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 370,
"timestamp": "2026-01-03T09:12:00Z",
"transaction_amount_usd": 14.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2148618.85,
"financial_exposure_usd": 2393282.39,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105691",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "medium",
"timestamp": "2026-01-04T22:51:00Z",
"trace_id": "c98a7ea9-9a52-e056-3856-64d6b4155283"
} | {
"account_age_days": 1141,
"account_id": "ACCT-55FF273D6512",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_2",
"session_entropy": 0.237
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 172,
"timestamp": "2026-01-04T22:51:00Z",
"transaction_amount_usd": 2835538.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.476,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4220133.35,
"financial_exposure_usd": 4561874.3,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101682",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-02T04:02:00Z",
"trace_id": "8d8a57e4-b2ce-02c6-5b1e-f9a2f45fe2ad"
} | {
"account_age_days": 1922,
"account_id": "ACCT-39ECABBD8322",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_1",
"session_entropy": 0.39
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 146,
"timestamp": "2026-01-02T00:00:00Z",
"transaction_amount_usd": 0.83
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.697,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 278274.11,
"financial_exposure_usd": 342654.6,
"recoverable_pct": 0.328
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100964",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "medium",
"timestamp": "2026-01-01T16:04:00Z",
"trace_id": "66ea2ec9-21c1-56a4-c944-2270adde0f60"
} | {
"account_age_days": 1709,
"account_id": "ACCT-CB0468280264",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_2",
"session_entropy": 0.245
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 810,
"timestamp": "2026-01-01T16:04:00Z",
"transaction_amount_usd": 63277.89
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.82,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 481863.56,
"financial_exposure_usd": 526726.98,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101722",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-02T04:42:00Z",
"trace_id": "492bf659-f80b-dd89-0a22-5ba7f73f4483"
} | {
"account_age_days": 16,
"account_id": "ACCT-62EDF4A14EF0",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_2",
"session_entropy": 0.244
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 204,
"timestamp": "2026-01-01T17:24:00Z",
"transaction_amount_usd": 6.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.738,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 358448.43,
"financial_exposure_usd": 377058.38,
"recoverable_pct": 0.003
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101183",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "medium",
"timestamp": "2026-01-01T19:43:00Z",
"trace_id": "d31396b6-8151-fa45-97eb-da8803f85194"
} | {
"account_age_days": 1728,
"account_id": "ACCT-B19951FF215D",
"baseline_risk_score": 0.637,
"kyc_tier": "tier_3",
"session_entropy": 0.835
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 176,
"timestamp": "2026-01-01T16:55:00Z",
"transaction_amount_usd": 10.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 354124.19,
"financial_exposure_usd": 856932.16,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108774",
"label": "benign",
"label_confidence": 0.527,
"severity": "medium",
"timestamp": "2026-01-07T02:14:00Z",
"trace_id": "91fcdcd3-0739-38c2-ba97-3bb18271ffc9"
} | {
"account_age_days": 1796,
"account_id": "ACCT-C021241B4E6E",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_3",
"session_entropy": 0.792
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 701,
"timestamp": "2026-01-07T02:14:00Z",
"transaction_amount_usd": 8418.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.601,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2289.94,
"financial_exposure_usd": 2934.73,
"recoverable_pct": 0.776
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107971",
"label": "benign",
"label_confidence": 0.501,
"severity": "medium",
"timestamp": "2026-01-06T12:51:00Z",
"trace_id": "bd032ff8-5a0d-6ce2-93fa-c80b0336387b"
} | {
"account_age_days": 1495,
"account_id": "ACCT-B022108EAED4",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_3",
"session_entropy": 0.845
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 304,
"timestamp": "2026-01-06T08:13:00Z",
"transaction_amount_usd": 13.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.563,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2880.97,
"financial_exposure_usd": 3381.48,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108549",
"label": "benign",
"label_confidence": 0.564,
"severity": "medium",
"timestamp": "2026-01-06T22:29:00Z",
"trace_id": "ecd60c80-a52c-a550-9885-eeb45d8c0ea7"
} | {
"account_age_days": 1448,
"account_id": "ACCT-5F4AD4B82F76",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.633
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 190,
"timestamp": "2026-01-06T16:07:00Z",
"transaction_amount_usd": 23.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 6049.91,
"financial_exposure_usd": 8415.46,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100899",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "high",
"timestamp": "2026-01-01T14:59:00Z",
"trace_id": "ef70f7e4-2f57-8774-cbbc-d7ff199cdb59"
} | {
"account_age_days": 1378,
"account_id": "ACCT-D9E6A662BE65",
"baseline_risk_score": 0.499,
"kyc_tier": "tier_1",
"session_entropy": 0.269
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 373,
"timestamp": "2026-01-01T03:14:00Z",
"transaction_amount_usd": 0.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.558,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 927349.76,
"financial_exposure_usd": 1028709.54,
"recoverable_pct": 0.681
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103957",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "critical",
"timestamp": "2026-01-03T17:57:00Z",
"trace_id": "6b755b09-6851-35ce-51ca-ad2083eb65f5"
} | {
"account_age_days": 153,
"account_id": "ACCT-5BE9B5040D6A",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_1",
"session_entropy": 0.371
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 570,
"timestamp": "2026-01-03T17:57:00Z",
"transaction_amount_usd": 1568860.18
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.562,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 924782.36,
"financial_exposure_usd": 928583.7,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102238",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "critical",
"timestamp": "2026-01-02T13:18:00Z",
"trace_id": "1ed6b1ce-32db-d68b-9a1e-8015e56ef9ab"
} | {
"account_age_days": 257,
"account_id": "ACCT-9AC8CAD6C79E",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.888
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 673,
"timestamp": "2026-01-02T13:18:00Z",
"transaction_amount_usd": 19832.45
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.553,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 489168.15,
"financial_exposure_usd": 1001417.86,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105830",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "high",
"timestamp": "2026-01-05T01:10:00Z",
"trace_id": "6838b161-56fd-c880-8096-c15cdffe8f60"
} | {
"account_age_days": 1603,
"account_id": "ACCT-62A4BA16F10F",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1129,
"timestamp": "2026-01-05T01:10:00Z",
"transaction_amount_usd": 2106614.09
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1491314.35,
"financial_exposure_usd": 3068109.17,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100430",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-01T07:10:00Z",
"trace_id": "6b92273a-ca8f-0a3a-9484-533243a2647c"
} | {
"account_age_days": 1041,
"account_id": "ACCT-939D0DEBAEE1",
"baseline_risk_score": 0.476,
"kyc_tier": "tier_2",
"session_entropy": 0.279
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 776,
"timestamp": "2026-01-01T07:10:00Z",
"transaction_amount_usd": 90714.14
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.916,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 468376.99,
"financial_exposure_usd": 547856.08,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103001",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "low",
"timestamp": "2026-01-03T02:01:00Z",
"trace_id": "af1a5c99-dd40-1734-8ad8-7c5851cdb51f"
} | {
"account_age_days": 311,
"account_id": "ACCT-84F2D6ADDD80",
"baseline_risk_score": 0.418,
"kyc_tier": "tier_3",
"session_entropy": 0.556
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 875,
"timestamp": "2026-01-03T02:01:00Z",
"transaction_amount_usd": 78687.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.784,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 131026.63,
"financial_exposure_usd": 200224.4,
"recoverable_pct": 0.498
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104844",
"label": "fraudulent",
"label_confidence": 0.613,
"severity": "medium",
"timestamp": "2026-01-04T08:44:00Z",
"trace_id": "369632a5-585e-d00f-9d28-823f1a7a6f71"
} | {
"account_age_days": 1584,
"account_id": "ACCT-7B86EF9F15D1",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_2",
"session_entropy": 0.87
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1137,
"timestamp": "2026-01-04T08:44:00Z",
"transaction_amount_usd": 1176357.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1764479.47,
"financial_exposure_usd": 3474351.3,
"recoverable_pct": 1
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106577",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-05T13:37:00Z",
"trace_id": "8f0b968e-71a5-06d9-359f-c3303882bdcf"
} | {
"account_age_days": 1089,
"account_id": "ACCT-E541446B0CDD",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.501
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 271,
"timestamp": "2026-01-05T10:24:00Z",
"transaction_amount_usd": 12.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.619,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3727119.55,
"financial_exposure_usd": 4293513.89,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102224",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "critical",
"timestamp": "2026-01-02T13:04:00Z",
"trace_id": "04483e20-318e-eb02-13a1-56582a48c15a"
} | {
"account_age_days": 274,
"account_id": "ACCT-AAF83512ED22",
"baseline_risk_score": 0.624,
"kyc_tier": "tier_3",
"session_entropy": 0.132
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 982,
"timestamp": "2026-01-02T13:04:00Z",
"transaction_amount_usd": 9955.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.671,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 443279.71,
"financial_exposure_usd": 918677.93,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100112",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "medium",
"timestamp": "2026-01-01T01:52:00Z",
"trace_id": "42c45041-e183-1003-5bd9-72c704a434e7"
} | {
"account_age_days": 505,
"account_id": "ACCT-C4EB8E5D6A6E",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.754
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 210,
"timestamp": "2026-01-01T01:52:00Z",
"transaction_amount_usd": 21378.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.522,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 206520.26,
"financial_exposure_usd": 457773.9,
"recoverable_pct": 0.317
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104505",
"label": "fraudulent",
"label_confidence": 0.728,
"severity": "critical",
"timestamp": "2026-01-04T03:05:00Z",
"trace_id": "0208525b-790f-64fb-10c0-fb744bb2453d"
} | {
"account_age_days": 1196,
"account_id": "ACCT-FED0595314D7",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_1",
"session_entropy": 0.473
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 918,
"timestamp": "2026-01-04T03:05:00Z",
"transaction_amount_usd": 2389036.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.479,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3352686.44,
"financial_exposure_usd": 5197600.3,
"recoverable_pct": 0.435
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103578",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-03T11:38:00Z",
"trace_id": "5d6c6a86-d910-b1a6-6a40-b17c2fc94896"
} | {
"account_age_days": 359,
"account_id": "ACCT-C208DE1113A9",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_1",
"session_entropy": 0.392
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 844,
"timestamp": "2026-01-03T11:38:00Z",
"transaction_amount_usd": 518549.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.52,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3902274.65,
"financial_exposure_usd": 5405894.57,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103029",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-03T02:29:00Z",
"trace_id": "31f90c96-97e4-4ab8-e762-316608737c64"
} | {
"account_age_days": 517,
"account_id": "ACCT-9063DBE0D77A",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.191
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 662,
"timestamp": "2026-01-03T02:29:00Z",
"transaction_amount_usd": 66602.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.49,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 240397.33,
"financial_exposure_usd": 258824.6,
"recoverable_pct": 0.229
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106507",
"label": "fraudulent",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-05T12:27:00Z",
"trace_id": "0c9f300f-bc39-7eec-1739-4b96ddd6b997"
} | {
"account_age_days": 1141,
"account_id": "ACCT-770EE91A9AF7",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_1",
"session_entropy": 0.152
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 807,
"timestamp": "2026-01-05T12:27:00Z",
"transaction_amount_usd": 1455711.05
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.422,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3849859.01,
"financial_exposure_usd": 4574895.33,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109288",
"label": "benign",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-07T10:48:00Z",
"trace_id": "0130eaf9-2d54-1754-e345-58e070676934"
} | {
"account_age_days": 738,
"account_id": "ACCT-A5B083BA22CB",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.746
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 260,
"timestamp": "2026-01-07T02:17:00Z",
"transaction_amount_usd": 14.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.504,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2823.5,
"financial_exposure_usd": 4120.2,
"recoverable_pct": 0.619
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107161",
"label": "benign",
"label_confidence": 0.618,
"severity": "low",
"timestamp": "2026-01-05T23:21:00Z",
"trace_id": "f8532f8b-44da-33e1-21f1-c7319543a540"
} | {
"account_age_days": 1405,
"account_id": "ACCT-303103246C05",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_3",
"session_entropy": 0.525
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 921,
"timestamp": "2026-01-05T23:21:00Z",
"transaction_amount_usd": 5957.56
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 88.46,
"financial_exposure_usd": 156.46,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103946",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-03T17:46:00Z",
"trace_id": "667325a8-25fd-bd69-70b5-4e84c86a1c1b"
} | {
"account_age_days": 1272,
"account_id": "ACCT-A630507A74B4",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_2",
"session_entropy": 0.914
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 805,
"timestamp": "2026-01-03T17:46:00Z",
"transaction_amount_usd": 438208.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.834,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1053897.17,
"financial_exposure_usd": 1844853.86,
"recoverable_pct": 0.967
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107617",
"label": "benign",
"label_confidence": 0.666,
"severity": "low",
"timestamp": "2026-01-06T06:57:00Z",
"trace_id": "b275c573-f9e0-94f4-5ce9-da2dad462ab5"
} | {
"account_age_days": 743,
"account_id": "ACCT-40509BEE1996",
"baseline_risk_score": 0.115,
"kyc_tier": "tier_2",
"session_entropy": 0.722
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 842,
"timestamp": "2026-01-06T06:57:00Z",
"transaction_amount_usd": 14729.23
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1096.83,
"financial_exposure_usd": 1575.49,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105293",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "high",
"timestamp": "2026-01-04T16:13:00Z",
"trace_id": "37c77766-82c3-bafe-bfd6-e51bd439a238"
} | {
"account_age_days": 1153,
"account_id": "ACCT-872C4B7D3135",
"baseline_risk_score": 0.121,
"kyc_tier": "tier_1",
"session_entropy": 0.142
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 671,
"timestamp": "2026-01-04T16:13:00Z",
"transaction_amount_usd": 2884318.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.818,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2280954.6,
"financial_exposure_usd": 3176881.25,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106504",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "low",
"timestamp": "2026-01-05T12:24:00Z",
"trace_id": "5af05b37-400f-8405-eded-d35146538e41"
} | {
"account_age_days": 601,
"account_id": "ACCT-CBB7897EBF98",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_2",
"session_entropy": 0.905
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 663,
"timestamp": "2026-01-05T12:24:00Z",
"transaction_amount_usd": 1304867.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.432,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1273195.54,
"financial_exposure_usd": 1904032.54,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104770",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "critical",
"timestamp": "2026-01-04T07:30:00Z",
"trace_id": "471bce95-4aa6-58d7-2fad-9a3ec1f868b9"
} | {
"account_age_days": 200,
"account_id": "ACCT-7CFEFEC6F522",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 135,
"timestamp": "2026-01-03T21:47:00Z",
"transaction_amount_usd": 22.84
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.547,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2158800.69,
"financial_exposure_usd": 2942826.69,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106521",
"label": "fraudulent",
"label_confidence": 0.685,
"severity": "medium",
"timestamp": "2026-01-05T12:41:00Z",
"trace_id": "a5d11559-8993-b4d6-949b-927185139514"
} | {
"account_age_days": 1473,
"account_id": "ACCT-83B59783CA6E",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.433
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 367,
"timestamp": "2026-01-05T12:41:00Z",
"transaction_amount_usd": 1265325.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2226418.48,
"financial_exposure_usd": 4861505.33,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105050",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "high",
"timestamp": "2026-01-04T12:10:00Z",
"trace_id": "f89b8f92-b4db-48d5-1c7a-64666be8c49b"
} | {
"account_age_days": 1990,
"account_id": "ACCT-DEF221E22442",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_2",
"session_entropy": 0.777
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 210,
"timestamp": "2026-01-04T04:44:00Z",
"transaction_amount_usd": 20.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.578,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3088409.01,
"financial_exposure_usd": 4413682.49,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108020",
"label": "benign",
"label_confidence": 0.468,
"severity": "low",
"timestamp": "2026-01-06T13:40:00Z",
"trace_id": "501a0ac9-09cf-0bd5-7703-c9b88686d322"
} | {
"account_age_days": 610,
"account_id": "ACCT-9E9E6A57A81A",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_3",
"session_entropy": 0.632
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1154,
"timestamp": "2026-01-06T13:40:00Z",
"transaction_amount_usd": 9552.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 892.38,
"financial_exposure_usd": 1679.64,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103350",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "critical",
"timestamp": "2026-01-03T07:50:00Z",
"trace_id": "ac030f73-7ccb-311f-1f67-afaaa014f7c1"
} | {
"account_age_days": 35,
"account_id": "ACCT-6E728596F6C8",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_1",
"session_entropy": 0.15
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 313,
"timestamp": "2026-01-03T01:55:00Z",
"transaction_amount_usd": 11.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.452,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5133361.8,
"financial_exposure_usd": 8356560.83,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108220",
"label": "benign",
"label_confidence": 0.613,
"severity": "medium",
"timestamp": "2026-01-06T17:00:00Z",
"trace_id": "9c1e015f-56e9-24e4-1139-da4f7913e44c"
} | {
"account_age_days": 904,
"account_id": "ACCT-021C34745DB8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.318
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 283,
"timestamp": "2026-01-06T13:44:00Z",
"transaction_amount_usd": 24.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6960.04,
"financial_exposure_usd": 7190.35,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100335",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "medium",
"timestamp": "2026-01-01T05:35:00Z",
"trace_id": "6cf4d2fd-d37f-6059-71d7-64ba1712df48"
} | {
"account_age_days": 549,
"account_id": "ACCT-381D02E58F73",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_2",
"session_entropy": 0.479
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 290,
"timestamp": "2025-12-31T17:54:00Z",
"transaction_amount_usd": 24.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.811,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 314244.33,
"financial_exposure_usd": 591335.55,
"recoverable_pct": 0.294
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106709",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-05T15:49:00Z",
"trace_id": "c0736b5a-ce77-5ad7-e108-e6939cd56011"
} | {
"account_age_days": 113,
"account_id": "ACCT-EA73CCA54C35",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.675
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1034,
"timestamp": "2026-01-05T15:49:00Z",
"transaction_amount_usd": 4722.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2826.58,
"financial_exposure_usd": 3158.99,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103304",
"label": "fraudulent",
"label_confidence": 0.974,
"severity": "high",
"timestamp": "2026-01-03T07:04:00Z",
"trace_id": "97aff206-eadf-75f3-9e9b-426700e0ceff"
} | {
"account_age_days": 1108,
"account_id": "ACCT-AC4595102F67",
"baseline_risk_score": 0.513,
"kyc_tier": "tier_1",
"session_entropy": 0.149
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 508,
"timestamp": "2026-01-03T07:04:00Z",
"transaction_amount_usd": 50502.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.877,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 479640.78,
"financial_exposure_usd": 620915.51,
"recoverable_pct": 0.116
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102560",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "high",
"timestamp": "2026-01-02T18:40:00Z",
"trace_id": "537d059b-5433-d6a7-d372-0c6d195a821d"
} | {
"account_age_days": 605,
"account_id": "ACCT-13B2ADDF62FD",
"baseline_risk_score": 0.524,
"kyc_tier": "tier_2",
"session_entropy": 0.906
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 652,
"timestamp": "2026-01-02T18:40:00Z",
"transaction_amount_usd": 53449.98
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.752,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 368271.66,
"financial_exposure_usd": 496216.72,
"recoverable_pct": 0.207
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106387",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "low",
"timestamp": "2026-01-05T10:27:00Z",
"trace_id": "12c73861-4dfa-b988-0c92-04ad3c816228"
} | {
"account_age_days": 1706,
"account_id": "ACCT-02A437FDF98E",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_1",
"session_entropy": 0.425
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 676,
"timestamp": "2026-01-05T10:27:00Z",
"transaction_amount_usd": 2441500.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.611,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3852240.32,
"financial_exposure_usd": 5943590.85,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101331",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "critical",
"timestamp": "2026-01-01T22:11:00Z",
"trace_id": "0a4e6244-3ead-0eb7-1b4e-f51b8ce6f491"
} | {
"account_age_days": 212,
"account_id": "ACCT-C9DA79D0C3F9",
"baseline_risk_score": 0.398,
"kyc_tier": "tier_3",
"session_entropy": 0.865
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 280,
"timestamp": "2026-01-01T22:11:00Z",
"transaction_amount_usd": 115695.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1115501.09,
"financial_exposure_usd": 1130787.16,
"recoverable_pct": 0.28
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101453",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-02T00:13:00Z",
"trace_id": "ddb57805-87b9-09e4-48f5-55cc4253876c"
} | {
"account_age_days": 700,
"account_id": "ACCT-E82EADF6E0E9",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_1",
"session_entropy": 0.462
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 562,
"timestamp": "2026-01-02T00:13:00Z",
"transaction_amount_usd": 65041.32
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.576,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 367404.72,
"financial_exposure_usd": 711418.25,
"recoverable_pct": 0.329
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101343",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "critical",
"timestamp": "2026-01-01T22:23:00Z",
"trace_id": "332e2391-6700-08c9-42be-b8e1e02ff3e1"
} | {
"account_age_days": 1432,
"account_id": "ACCT-0F993A04EBD0",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_3",
"session_entropy": 0.425
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 266,
"timestamp": "2026-01-01T16:31:00Z",
"transaction_amount_usd": 13.72
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.877,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 381848.28,
"financial_exposure_usd": 526932.59,
"recoverable_pct": 0.399
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102129",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "medium",
"timestamp": "2026-01-02T11:29:00Z",
"trace_id": "f5965b25-e967-8264-09bf-03da2960359f"
} | {
"account_age_days": 1498,
"account_id": "ACCT-58911E972349",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_3",
"session_entropy": 0.411
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1092,
"timestamp": "2026-01-02T11:29:00Z",
"transaction_amount_usd": 47255.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.505,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 493215.58,
"financial_exposure_usd": 566376.02,
"recoverable_pct": 0.385
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106080",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "high",
"timestamp": "2026-01-05T05:20:00Z",
"trace_id": "7e665341-24cc-66e2-681f-91f8132ec060"
} | {
"account_age_days": 835,
"account_id": "ACCT-27E1E68EA903",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_1",
"session_entropy": 0.672
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 770,
"timestamp": "2026-01-05T05:20:00Z",
"transaction_amount_usd": 1838038.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.472,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2305880.1,
"financial_exposure_usd": 4017089.69,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108495",
"label": "benign",
"label_confidence": 0.727,
"severity": "low",
"timestamp": "2026-01-06T21:35:00Z",
"trace_id": "d669c978-0529-de8d-9281-dc71d3a35923"
} | {
"account_age_days": 1448,
"account_id": "ACCT-158A8C04E1EB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.714
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 360,
"timestamp": "2026-01-06T21:35:00Z",
"transaction_amount_usd": 14357.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.481,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1340.26,
"financial_exposure_usd": 2106.61,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106305",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-05T09:05:00Z",
"trace_id": "20987fa2-feb2-f426-8695-62a551db9e84"
} | {
"account_age_days": 790,
"account_id": "ACCT-43C4E150CB1B",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_3",
"session_entropy": 0.897
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 475,
"timestamp": "2026-01-05T09:05:00Z",
"transaction_amount_usd": 219086.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.932,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3939838.98,
"financial_exposure_usd": 4726815.72,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109980",
"label": "benign",
"label_confidence": 0.526,
"severity": "medium",
"timestamp": "2026-01-07T22:20:00Z",
"trace_id": "6d3ed8da-fe22-d289-7b25-eb5dad4ae2d8"
} | {
"account_age_days": 274,
"account_id": "ACCT-AAE79A53ABF3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.475
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 298,
"timestamp": "2026-01-07T22:20:00Z",
"transaction_amount_usd": 11955.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1866.28,
"financial_exposure_usd": 3019.64,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104040",
"label": "fraudulent",
"label_confidence": 0.668,
"severity": "low",
"timestamp": "2026-01-03T19:20:00Z",
"trace_id": "c36356aa-488f-e8ba-e778-2225fbd5c7dc"
} | {
"account_age_days": 1513,
"account_id": "ACCT-B08B265F2148",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_3",
"session_entropy": 0.738
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 217,
"timestamp": "2026-01-03T19:20:00Z",
"transaction_amount_usd": 1231126.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5567808.15,
"financial_exposure_usd": 6446827.69,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100925",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "critical",
"timestamp": "2026-01-01T15:25:00Z",
"trace_id": "5d0ec3ec-b2b9-ef4e-b587-93da055ab0f2"
} | {
"account_age_days": 1651,
"account_id": "ACCT-645EBE9B1A33",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_3",
"session_entropy": 0.389
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1073,
"timestamp": "2026-01-01T15:25:00Z",
"transaction_amount_usd": 111231.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.934,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 440660.65,
"financial_exposure_usd": 899264.11,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109043",
"label": "benign",
"label_confidence": 0.512,
"severity": "medium",
"timestamp": "2026-01-07T06:43:00Z",
"trace_id": "f7e014e9-c049-ef9a-0549-a94cb2a08fc5"
} | {
"account_age_days": 210,
"account_id": "ACCT-174AD59D0E1B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.352
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 965,
"timestamp": "2026-01-07T06:43:00Z",
"transaction_amount_usd": 8719.26
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.649,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 295.57,
"financial_exposure_usd": 394.78,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106675",
"label": "benign",
"label_confidence": 0.517,
"severity": "medium",
"timestamp": "2026-01-05T15:15:00Z",
"trace_id": "92edd301-dae1-e18f-13b9-46e38637e183"
} | {
"account_age_days": 1524,
"account_id": "ACCT-15866B794ED2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.411
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 236,
"timestamp": "2026-01-05T15:15:00Z",
"transaction_amount_usd": 14277.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 505.64,
"financial_exposure_usd": 1216.77,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108749",
"label": "benign",
"label_confidence": 0.563,
"severity": "high",
"timestamp": "2026-01-07T01:49:00Z",
"trace_id": "6174c9cf-3552-06d4-aba8-2af2e0c983c3"
} | {
"account_age_days": 1225,
"account_id": "ACCT-B099F85BEEE6",
"baseline_risk_score": 0.06,
"kyc_tier": "tier_2",
"session_entropy": 0.651
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 92,
"timestamp": "2026-01-07T01:49:00Z",
"transaction_amount_usd": 5164.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 747.25,
"financial_exposure_usd": 1255.36,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101238",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "high",
"timestamp": "2026-01-01T20:38:00Z",
"trace_id": "b189c096-7e4f-4807-8902-e922ec3d799a"
} | {
"account_age_days": 41,
"account_id": "ACCT-48971CB771FF",
"baseline_risk_score": 0.417,
"kyc_tier": "tier_2",
"session_entropy": 0.903
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 874,
"timestamp": "2026-01-01T20:38:00Z",
"transaction_amount_usd": 59979.72
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.854,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 725565.16,
"financial_exposure_usd": 977840.64,
"recoverable_pct": 0.213
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104909",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "low",
"timestamp": "2026-01-04T09:49:00Z",
"trace_id": "3a5ecff4-f0d0-a94e-3239-e28760cdf885"
} | {
"account_age_days": 894,
"account_id": "ACCT-0F1DA742C0F0",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_2",
"session_entropy": 0.535
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 195,
"timestamp": "2026-01-04T08:16:00Z",
"transaction_amount_usd": 10.66
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.688,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2646293.76,
"financial_exposure_usd": 3374374.66,
"recoverable_pct": 0.592
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104759",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "medium",
"timestamp": "2026-01-04T07:19:00Z",
"trace_id": "050ec5ba-963d-42c0-9e90-7f06f22b018c"
} | {
"account_age_days": 1290,
"account_id": "ACCT-5FC27B89F90F",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_3",
"session_entropy": 0.204
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 841,
"timestamp": "2026-01-04T07:19:00Z",
"transaction_amount_usd": 2586116.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.804,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1332128.51,
"financial_exposure_usd": 2736255.84,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105682",
"label": "fraudulent",
"label_confidence": 0.67,
"severity": "low",
"timestamp": "2026-01-04T22:42:00Z",
"trace_id": "8b7ca82d-e2af-2230-07c9-c27b45976d7d"
} | {
"account_age_days": 1367,
"account_id": "ACCT-FA7E918F2964",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_2",
"session_entropy": 0.199
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1019,
"timestamp": "2026-01-04T22:42:00Z",
"transaction_amount_usd": 2663259.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.596,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3438314.37,
"financial_exposure_usd": 7864847.53,
"recoverable_pct": 0.867
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107433",
"label": "benign",
"label_confidence": 0.728,
"severity": "low",
"timestamp": "2026-01-06T03:53:00Z",
"trace_id": "6693b560-f952-7a64-0c85-662fa03348b6"
} | {
"account_age_days": 427,
"account_id": "ACCT-851B246B09A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.287
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 895,
"timestamp": "2026-01-06T03:53:00Z",
"transaction_amount_usd": 12671.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.743,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1192.36,
"financial_exposure_usd": 2108.9,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104234",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "critical",
"timestamp": "2026-01-03T22:34:00Z",
"trace_id": "1700c4b7-4ca2-68ba-6701-d2db915bb0f9"
} | {
"account_age_days": 1957,
"account_id": "ACCT-E9F610847B20",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 619,
"timestamp": "2026-01-03T22:34:00Z",
"transaction_amount_usd": 1839107.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.735,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3392578.33,
"financial_exposure_usd": 6947761.07,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104961",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "high",
"timestamp": "2026-01-04T10:41:00Z",
"trace_id": "af1c24f4-26f1-9754-709c-7d3d3d5139f6"
} | {
"account_age_days": 571,
"account_id": "ACCT-85F4B64BCCD8",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.181
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 234,
"timestamp": "2026-01-04T10:41:00Z",
"transaction_amount_usd": 1736093.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.651,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5186165.69,
"financial_exposure_usd": 6645019.46,
"recoverable_pct": 0.445
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109625",
"label": "benign",
"label_confidence": 0.494,
"severity": "high",
"timestamp": "2026-01-07T16:25:00Z",
"trace_id": "ab638841-575b-e446-f122-88c4c0039a2a"
} | {
"account_age_days": 1512,
"account_id": "ACCT-7060271B795F",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_2",
"session_entropy": 0.683
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 754,
"timestamp": "2026-01-07T16:25:00Z",
"transaction_amount_usd": 4677.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.523,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 651,
"financial_exposure_usd": 1042.94,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104577",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "medium",
"timestamp": "2026-01-04T04:17:00Z",
"trace_id": "bc18491b-85a9-68ad-a712-26d022242d34"
} | {
"account_age_days": 1239,
"account_id": "ACCT-BB3DF092C6AB",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_1",
"session_entropy": 0.656
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 798,
"timestamp": "2026-01-04T04:17:00Z",
"transaction_amount_usd": 1600550.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.531,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4094422.6,
"financial_exposure_usd": 5425836.95,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106919",
"label": "benign",
"label_confidence": 0.501,
"severity": "high",
"timestamp": "2026-01-05T19:19:00Z",
"trace_id": "f752a5cd-409a-b258-1d07-f6a64ebaee3b"
} | {
"account_age_days": 254,
"account_id": "ACCT-5B73DA6B6074",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.267
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 166,
"timestamp": "2026-01-05T12:03:00Z",
"transaction_amount_usd": 0.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4296.5,
"financial_exposure_usd": 5705.58,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109705",
"label": "benign",
"label_confidence": 0.462,
"severity": "critical",
"timestamp": "2026-01-07T17:45:00Z",
"trace_id": "39b2d25d-ebb3-3590-7794-0b0e8782e2a4"
} | {
"account_age_days": 267,
"account_id": "ACCT-8EA7F5825634",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_3",
"session_entropy": 0.429
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 625,
"timestamp": "2026-01-07T17:45:00Z",
"transaction_amount_usd": 14883.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2699.86,
"financial_exposure_usd": 4239.62,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105844",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "critical",
"timestamp": "2026-01-05T01:24:00Z",
"trace_id": "e0f6a7af-9715-7c01-f0ba-43050c6955f6"
} | {
"account_age_days": 1429,
"account_id": "ACCT-CF96EA51A2BB",
"baseline_risk_score": 0.189,
"kyc_tier": "tier_3",
"session_entropy": 0.639
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1197,
"timestamp": "2026-01-05T01:24:00Z",
"transaction_amount_usd": 1225801.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.483,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2378969.65,
"financial_exposure_usd": 4754752.31,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.