schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105657",
"label": "fraudulent",
"label_confidence": 0.721,
"severity": "low",
"timestamp": "2026-01-04T22:17:00Z",
"trace_id": "089bca15-56b4-be49-d9a4-163d176c0fe7"
} | {
"account_age_days": 541,
"account_id": "ACCT-E7924263068B",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_2",
"session_entropy": 0.315
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 338,
"timestamp": "2026-01-04T17:37:00Z",
"transaction_amount_usd": 16.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.454,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4624745.13,
"financial_exposure_usd": 5322286.26,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107139",
"label": "benign",
"label_confidence": 0.461,
"severity": "low",
"timestamp": "2026-01-05T22:59:00Z",
"trace_id": "24ec98a3-dbf7-4604-44da-1fefd599df3e"
} | {
"account_age_days": 1097,
"account_id": "ACCT-744746EABA37",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_2",
"session_entropy": 0.187
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 237,
"timestamp": "2026-01-05T22:59:00Z",
"transaction_amount_usd": 7101.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2448.12,
"financial_exposure_usd": 3575.94,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103573",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "low",
"timestamp": "2026-01-03T11:33:00Z",
"trace_id": "f708a99c-b138-dd0d-a02d-92adc13811d2"
} | {
"account_age_days": 335,
"account_id": "ACCT-EC1E7DBB2EF4",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.84
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 252,
"timestamp": "2026-01-03T11:33:00Z",
"transaction_amount_usd": 1272963.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.519,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1813252.14,
"financial_exposure_usd": 3918840.74,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100911",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "high",
"timestamp": "2026-01-01T15:11:00Z",
"trace_id": "d623ae4b-90a1-533e-6419-15ba0e47124b"
} | {
"account_age_days": 1478,
"account_id": "ACCT-62362DBA8AF3",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_1",
"session_entropy": 0.524
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 477,
"timestamp": "2026-01-01T15:11:00Z",
"transaction_amount_usd": 31893.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.578,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 242071.26,
"financial_exposure_usd": 307500.98,
"recoverable_pct": 0.131
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107640",
"label": "benign",
"label_confidence": 0.693,
"severity": "high",
"timestamp": "2026-01-06T07:20:00Z",
"trace_id": "fe5e05f2-5863-7700-ca50-17da1d794692"
} | {
"account_age_days": 560,
"account_id": "ACCT-D748EA96F817",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.231
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 360,
"timestamp": "2026-01-06T00:24:00Z",
"transaction_amount_usd": 21.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3578.16,
"financial_exposure_usd": 4244.17,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100424",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-01T07:04:00Z",
"trace_id": "fea44402-570d-3b38-9268-685751c06134"
} | {
"account_age_days": 933,
"account_id": "ACCT-0BA4475B6853",
"baseline_risk_score": 0.52,
"kyc_tier": "tier_1",
"session_entropy": 0.516
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 904,
"timestamp": "2026-01-01T07:04:00Z",
"transaction_amount_usd": 26401.88
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.67,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 164823.53,
"financial_exposure_usd": 293251.93,
"recoverable_pct": 0.073
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102064",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "low",
"timestamp": "2026-01-02T10:24:00Z",
"trace_id": "9396ef73-2f5a-dff1-e925-ea8020560ef5"
} | {
"account_age_days": 790,
"account_id": "ACCT-94331BC0BC5A",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 959,
"timestamp": "2026-01-02T10:24:00Z",
"transaction_amount_usd": 114086.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.803,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 310531.52,
"financial_exposure_usd": 507025.12,
"recoverable_pct": 0.065
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103144",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "medium",
"timestamp": "2026-01-03T04:24:00Z",
"trace_id": "b5b09509-95a8-0cc5-fe3a-3a1f97d07c02"
} | {
"account_age_days": 1872,
"account_id": "ACCT-503639C378A4",
"baseline_risk_score": 0.649,
"kyc_tier": "tier_2",
"session_entropy": 0.713
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 338,
"timestamp": "2026-01-02T17:49:00Z",
"transaction_amount_usd": 2.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 984153.7,
"financial_exposure_usd": 1221718.74,
"recoverable_pct": 0.018
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103424",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "critical",
"timestamp": "2026-01-03T09:04:00Z",
"trace_id": "6a90579a-bf87-2546-3e78-4f4339db39c9"
} | {
"account_age_days": 1686,
"account_id": "ACCT-3A04A42A039B",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_2",
"session_entropy": 0.556
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 220,
"timestamp": "2026-01-03T04:15:00Z",
"transaction_amount_usd": 16.76
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.51,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2385090.94,
"financial_exposure_usd": 3010378.78,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104249",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "medium",
"timestamp": "2026-01-03T22:49:00Z",
"trace_id": "381c6806-67b6-8231-97f0-90507b79f1a0"
} | {
"account_age_days": 861,
"account_id": "ACCT-532F56D20645",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_1",
"session_entropy": 0.167
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1176,
"timestamp": "2026-01-03T22:49:00Z",
"transaction_amount_usd": 371615.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.54,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4109419.22,
"financial_exposure_usd": 6024532.44,
"recoverable_pct": 0.824
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104672",
"label": "fraudulent",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-04T05:52:00Z",
"trace_id": "f507f863-d998-0f4f-348d-b88e7e1e0e3c"
} | {
"account_age_days": 1563,
"account_id": "ACCT-9D4DB37DD06A",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_2",
"session_entropy": 0.294
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 308,
"timestamp": "2026-01-04T03:33:00Z",
"transaction_amount_usd": 4.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.847,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1562989.89,
"financial_exposure_usd": 3494958.02,
"recoverable_pct": 0.813
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108726",
"label": "benign",
"label_confidence": 0.611,
"severity": "high",
"timestamp": "2026-01-07T01:26:00Z",
"trace_id": "1fadfea8-e16c-1993-cbee-1480571592cd"
} | {
"account_age_days": 1152,
"account_id": "ACCT-B806248C97BE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.89
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 329,
"timestamp": "2026-01-06T15:50:00Z",
"transaction_amount_usd": 14.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2473.25,
"financial_exposure_usd": 3074.45,
"recoverable_pct": 0.932
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109682",
"label": "benign",
"label_confidence": 0.582,
"severity": "medium",
"timestamp": "2026-01-07T17:22:00Z",
"trace_id": "4de480b1-5187-8120-01a8-9659e8c40625"
} | {
"account_age_days": 96,
"account_id": "ACCT-28B0990AB098",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_1",
"session_entropy": 0.937
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 186,
"timestamp": "2026-01-07T17:22:00Z",
"transaction_amount_usd": 12055.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.723,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1220.92,
"financial_exposure_usd": 2088.7,
"recoverable_pct": 0.94
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101540",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "low",
"timestamp": "2026-01-02T01:40:00Z",
"trace_id": "826aaddb-908f-2c3d-bf6f-9ce4a8fbdeab"
} | {
"account_age_days": 1143,
"account_id": "ACCT-197893039E43",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_3",
"session_entropy": 0.107
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 446,
"timestamp": "2026-01-02T01:40:00Z",
"transaction_amount_usd": 111838.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.599,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1250249.42,
"financial_exposure_usd": 1313469.08,
"recoverable_pct": 0.28
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108950",
"label": "benign",
"label_confidence": 0.542,
"severity": "low",
"timestamp": "2026-01-07T05:10:00Z",
"trace_id": "4847bc1e-e581-f2fa-d617-72d4dd4d15f1"
} | {
"account_age_days": 1541,
"account_id": "ACCT-8164CDCE879C",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.39
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 128,
"timestamp": "2026-01-06T23:45:00Z",
"transaction_amount_usd": 11.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5141.7,
"financial_exposure_usd": 8219.32,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103698",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "critical",
"timestamp": "2026-01-03T13:38:00Z",
"trace_id": "d49d531e-71f3-548d-ce08-c1d2130ff8b9"
} | {
"account_age_days": 1800,
"account_id": "ACCT-1E0054473C11",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 197,
"timestamp": "2026-01-03T13:38:00Z",
"transaction_amount_usd": 2919679.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.717,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1825181.88,
"financial_exposure_usd": 4337581.83,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106558",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "medium",
"timestamp": "2026-01-05T13:18:00Z",
"trace_id": "228e2c1f-8ba5-b051-cbb2-c25e3c784811"
} | {
"account_age_days": 587,
"account_id": "ACCT-04B8D036C175",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_2",
"session_entropy": 0.599
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 183,
"timestamp": "2026-01-05T06:52:00Z",
"transaction_amount_usd": 13.62
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.363,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4136116.33,
"financial_exposure_usd": 4150454.74,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101612",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "medium",
"timestamp": "2026-01-02T02:52:00Z",
"trace_id": "a6f9827f-8d25-66a9-d789-3aabce162f10"
} | {
"account_age_days": 325,
"account_id": "ACCT-E4EAEFFEBB91",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.789
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 916,
"timestamp": "2026-01-02T02:52:00Z",
"transaction_amount_usd": 26544.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 288970.43,
"financial_exposure_usd": 497255.24,
"recoverable_pct": 0.157
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103728",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "high",
"timestamp": "2026-01-03T14:08:00Z",
"trace_id": "ac8bfdfd-4f4b-bf7e-2817-aa8bab9ebffd"
} | {
"account_age_days": 1666,
"account_id": "ACCT-7B1BE73DD8C5",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_3",
"session_entropy": 0.544
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 312,
"timestamp": "2026-01-03T04:00:00Z",
"transaction_amount_usd": 3.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3335238.58,
"financial_exposure_usd": 5484477.17,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106505",
"label": "fraudulent",
"label_confidence": 0.626,
"severity": "high",
"timestamp": "2026-01-05T12:25:00Z",
"trace_id": "ea6fbcbb-625d-55ca-3f10-0189cdeec425"
} | {
"account_age_days": 168,
"account_id": "ACCT-CD5227F57BDB",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_3",
"session_entropy": 0.492
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 790,
"timestamp": "2026-01-05T12:25:00Z",
"transaction_amount_usd": 2927537.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.66,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4968672.59,
"financial_exposure_usd": 6227679.9,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108194",
"label": "benign",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-06T16:34:00Z",
"trace_id": "23cc30bc-6b96-f993-aa92-3f7fed586517"
} | {
"account_age_days": 930,
"account_id": "ACCT-34A240DBA566",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.836
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 224,
"timestamp": "2026-01-06T09:04:00Z",
"transaction_amount_usd": 22.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.643,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1517.27,
"financial_exposure_usd": 3767.96,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100665",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "high",
"timestamp": "2026-01-01T11:05:00Z",
"trace_id": "fb8a27ef-cccb-9f67-44d1-e260ad362172"
} | {
"account_age_days": 1123,
"account_id": "ACCT-36D992A423E2",
"baseline_risk_score": 0.525,
"kyc_tier": "tier_3",
"session_entropy": 0.371
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 996,
"timestamp": "2026-01-01T11:05:00Z",
"transaction_amount_usd": 82622.58
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 952829.44,
"financial_exposure_usd": 1181559.85,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109422",
"label": "benign",
"label_confidence": 0.491,
"severity": "medium",
"timestamp": "2026-01-07T13:02:00Z",
"trace_id": "70e3fe71-4092-cfb1-4231-f12fc6d5246e"
} | {
"account_age_days": 1805,
"account_id": "ACCT-ED746D027BC9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.516
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 750,
"timestamp": "2026-01-07T13:02:00Z",
"transaction_amount_usd": 8352.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.564,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2457.71,
"financial_exposure_usd": 3215.76,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105849",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "medium",
"timestamp": "2026-01-05T01:29:00Z",
"trace_id": "85b3c4aa-c3d8-52c6-2097-7e24170019b2"
} | {
"account_age_days": 1247,
"account_id": "ACCT-05149C4F140F",
"baseline_risk_score": 0.215,
"kyc_tier": "tier_3",
"session_entropy": 0.439
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 117,
"timestamp": "2026-01-04T21:54:00Z",
"transaction_amount_usd": 3.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.468,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4298210.49,
"financial_exposure_usd": 6448199.71,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102161",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "medium",
"timestamp": "2026-01-02T12:01:00Z",
"trace_id": "23305e65-f90d-258b-bded-6a97c2e6c493"
} | {
"account_age_days": 20,
"account_id": "ACCT-5E4EFCC0F10D",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.184
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 662,
"timestamp": "2026-01-02T12:01:00Z",
"transaction_amount_usd": 61873.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.889,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 197216.75,
"financial_exposure_usd": 245630.73,
"recoverable_pct": 0.079
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103399",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "critical",
"timestamp": "2026-01-03T08:39:00Z",
"trace_id": "c0433762-2b09-7032-aead-677875e408b4"
} | {
"account_age_days": 1823,
"account_id": "ACCT-860F822C2EB9",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_1",
"session_entropy": 0.738
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1086,
"timestamp": "2026-01-03T08:39:00Z",
"transaction_amount_usd": 1334129.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.939,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2966745.3,
"financial_exposure_usd": 6199100.17,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106108",
"label": "fraudulent",
"label_confidence": 0.622,
"severity": "critical",
"timestamp": "2026-01-05T05:48:00Z",
"trace_id": "2c331e83-50b5-8720-01ef-4a5285407def"
} | {
"account_age_days": 139,
"account_id": "ACCT-CD386488BB74",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 831,
"timestamp": "2026-01-05T05:48:00Z",
"transaction_amount_usd": 440321.82
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2143807.26,
"financial_exposure_usd": 2211065.84,
"recoverable_pct": 0.701
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106638",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "critical",
"timestamp": "2026-01-05T14:38:00Z",
"trace_id": "addf05a6-760b-a6f6-64f7-53be8581a320"
} | {
"account_age_days": 1116,
"account_id": "ACCT-EB48EE966DF0",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_1",
"session_entropy": 0.943
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 209,
"timestamp": "2026-01-05T14:38:00Z",
"transaction_amount_usd": 373381.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.586,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5705489.13,
"financial_exposure_usd": 8583367.35,
"recoverable_pct": 0.911
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105658",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "medium",
"timestamp": "2026-01-04T22:18:00Z",
"trace_id": "b05a5eae-8779-bb88-3be4-565ab86d0b7c"
} | {
"account_age_days": 62,
"account_id": "ACCT-B3F286E89019",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.553
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 333,
"timestamp": "2026-01-04T13:51:00Z",
"transaction_amount_usd": 21.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2505657.65,
"financial_exposure_usd": 4222319.22,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106930",
"label": "benign",
"label_confidence": 0.584,
"severity": "low",
"timestamp": "2026-01-05T19:30:00Z",
"trace_id": "b2039610-375e-0c69-06cd-f190dacd46f9"
} | {
"account_age_days": 1586,
"account_id": "ACCT-DE58E96BC803",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.724
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1156,
"timestamp": "2026-01-05T19:30:00Z",
"transaction_amount_usd": 4569.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3683.21,
"financial_exposure_usd": 4160.67,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103159",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "low",
"timestamp": "2026-01-03T04:39:00Z",
"trace_id": "51803acb-f6eb-37e3-24c8-9f493796e049"
} | {
"account_age_days": 698,
"account_id": "ACCT-A8C9E928F734",
"baseline_risk_score": 0.636,
"kyc_tier": "tier_3",
"session_entropy": 0.465
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 178,
"timestamp": "2026-01-02T21:11:00Z",
"transaction_amount_usd": 2.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.441,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 89386.17,
"financial_exposure_usd": 129560.75,
"recoverable_pct": 0.004
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102528",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "critical",
"timestamp": "2026-01-02T18:08:00Z",
"trace_id": "dc99a80c-c3d8-e98b-24f3-f367a6ccb7b7"
} | {
"account_age_days": 888,
"account_id": "ACCT-8872D713C81F",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_1",
"session_entropy": 0.614
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 818,
"timestamp": "2026-01-02T18:08:00Z",
"transaction_amount_usd": 17971.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.526,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 469021.92,
"financial_exposure_usd": 1058794.34,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104336",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-04T00:16:00Z",
"trace_id": "4ce62330-8c7f-0b04-e3c0-2ea552c3c403"
} | {
"account_age_days": 1972,
"account_id": "ACCT-F8FAF5A6440A",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_1",
"session_entropy": 0.682
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 479,
"timestamp": "2026-01-04T00:16:00Z",
"transaction_amount_usd": 600951.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3749869.69,
"financial_exposure_usd": 7346661.6,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101228",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "high",
"timestamp": "2026-01-01T20:28:00Z",
"trace_id": "598fa47c-d55e-7df4-954b-c06efacbdda2"
} | {
"account_age_days": 655,
"account_id": "ACCT-4D8CB7ECA36D",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_1",
"session_entropy": 0.53
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 309,
"timestamp": "2026-01-01T20:28:00Z",
"transaction_amount_usd": 31678.05
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.608,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1278081.9,
"financial_exposure_usd": 1328810.01,
"recoverable_pct": 0.362
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103203",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-03T05:23:00Z",
"trace_id": "83299aed-b246-d682-120f-82b7150e32b6"
} | {
"account_age_days": 373,
"account_id": "ACCT-556D77114262",
"baseline_risk_score": 0.454,
"kyc_tier": "tier_1",
"session_entropy": 0.433
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 406,
"timestamp": "2026-01-03T05:23:00Z",
"transaction_amount_usd": 84904.81
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.656,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 392269.38,
"financial_exposure_usd": 828219.13,
"recoverable_pct": 0.018
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105290",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "low",
"timestamp": "2026-01-04T16:10:00Z",
"trace_id": "dfbd4127-d128-9ad1-17c8-01b93470f4c9"
} | {
"account_age_days": 1456,
"account_id": "ACCT-A0FAF359D86E",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.428
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 253,
"timestamp": "2026-01-04T12:38:00Z",
"transaction_amount_usd": 12.01
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1143243.04,
"financial_exposure_usd": 2585988.91,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105603",
"label": "fraudulent",
"label_confidence": 0.73,
"severity": "high",
"timestamp": "2026-01-04T21:23:00Z",
"trace_id": "8a785e82-a7c1-6e24-f4d0-431b156e1cb1"
} | {
"account_age_days": 828,
"account_id": "ACCT-F6232DFEF131",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_3",
"session_entropy": 0.342
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 155,
"timestamp": "2026-01-04T21:23:00Z",
"transaction_amount_usd": 175887.79
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3051853.27,
"financial_exposure_usd": 4361041.39,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109927",
"label": "benign",
"label_confidence": 0.747,
"severity": "low",
"timestamp": "2026-01-07T21:27:00Z",
"trace_id": "252c3bf9-5d44-348a-2b89-f8a9f950916b"
} | {
"account_age_days": 908,
"account_id": "ACCT-D26FD292D8E1",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_2",
"session_entropy": 0.425
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 762,
"timestamp": "2026-01-07T21:27:00Z",
"transaction_amount_usd": 307.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3298.4,
"financial_exposure_usd": 3991.97,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105726",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-04T23:26:00Z",
"trace_id": "17026b61-18b6-a378-6c54-09fa10b62402"
} | {
"account_age_days": 333,
"account_id": "ACCT-AB4CB1581664",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_2",
"session_entropy": 0.947
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1156,
"timestamp": "2026-01-04T23:26:00Z",
"transaction_amount_usd": 2560098.96
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.771,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2984726.76,
"financial_exposure_usd": 3852364.99,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102291",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "medium",
"timestamp": "2026-01-02T14:11:00Z",
"trace_id": "f3dda11f-ea80-8585-ae13-2e5f4ff77151"
} | {
"account_age_days": 1174,
"account_id": "ACCT-B6839D4F7AF8",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_1",
"session_entropy": 0.483
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 80,
"timestamp": "2026-01-02T14:11:00Z",
"transaction_amount_usd": 41170.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.469,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 656032.39,
"financial_exposure_usd": 946030.18,
"recoverable_pct": 0.407
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109600",
"label": "benign",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-07T16:00:00Z",
"trace_id": "a110240c-2bad-9dcc-7cc1-3c2c5190d50e"
} | {
"account_age_days": 1771,
"account_id": "ACCT-5F6BB0C6FF6D",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_3",
"session_entropy": 0.449
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 869,
"timestamp": "2026-01-07T16:00:00Z",
"transaction_amount_usd": 12733.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 614.89,
"financial_exposure_usd": 970.66,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107416",
"label": "benign",
"label_confidence": 0.647,
"severity": "low",
"timestamp": "2026-01-06T03:36:00Z",
"trace_id": "98b126fc-003c-aac0-fcbb-d48786d31e67"
} | {
"account_age_days": 1216,
"account_id": "ACCT-F124A4D9B828",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 686,
"timestamp": "2026-01-06T03:36:00Z",
"transaction_amount_usd": 7533.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2054.32,
"financial_exposure_usd": 4016.74,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108650",
"label": "benign",
"label_confidence": 0.646,
"severity": "medium",
"timestamp": "2026-01-07T00:10:00Z",
"trace_id": "a6100363-4415-64c3-23c2-bdc2ee3629f7"
} | {
"account_age_days": 1158,
"account_id": "ACCT-6CA9D7251821",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.809
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 816,
"timestamp": "2026-01-07T00:10:00Z",
"transaction_amount_usd": 7448.19
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 370.63,
"financial_exposure_usd": 428.54,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108200",
"label": "benign",
"label_confidence": 0.45,
"severity": "low",
"timestamp": "2026-01-06T16:40:00Z",
"trace_id": "8b6e757f-cf10-8762-eaf2-3d0f1863f4cc"
} | {
"account_age_days": 1212,
"account_id": "ACCT-4599719B1732",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.56
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 257,
"timestamp": "2026-01-06T12:51:00Z",
"transaction_amount_usd": 5.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1898.79,
"financial_exposure_usd": 4477.98,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104779",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "low",
"timestamp": "2026-01-04T07:39:00Z",
"trace_id": "05fec949-34bb-2139-3bf2-49372f2e2d8d"
} | {
"account_age_days": 1711,
"account_id": "ACCT-86ADED018211",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.674
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 538,
"timestamp": "2026-01-04T07:39:00Z",
"transaction_amount_usd": 2533123.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.637,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4393400.01,
"financial_exposure_usd": 4510099.63,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108903",
"label": "benign",
"label_confidence": 0.694,
"severity": "medium",
"timestamp": "2026-01-07T04:23:00Z",
"trace_id": "61e22485-5cd0-cf72-d1f2-46e557c104a9"
} | {
"account_age_days": 1732,
"account_id": "ACCT-AD3F60ACE2DE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.946
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1167,
"timestamp": "2026-01-07T04:23:00Z",
"transaction_amount_usd": 5563.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3603.75,
"financial_exposure_usd": 4888.11,
"recoverable_pct": 0.602
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104431",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "low",
"timestamp": "2026-01-04T01:51:00Z",
"trace_id": "088fe748-d303-4d69-c9f2-1e7abac009ea"
} | {
"account_age_days": 241,
"account_id": "ACCT-36D3922FCD81",
"baseline_risk_score": 0.221,
"kyc_tier": "tier_1",
"session_entropy": 0.754
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1085,
"timestamp": "2026-01-04T01:51:00Z",
"transaction_amount_usd": 2134077.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 7642566.11,
"financial_exposure_usd": 9153420.83,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103474",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "low",
"timestamp": "2026-01-03T09:54:00Z",
"trace_id": "d334f208-180f-1d3e-f7d1-5f8390ae39c0"
} | {
"account_age_days": 1781,
"account_id": "ACCT-CED081094368",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_2",
"session_entropy": 0.681
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 460,
"timestamp": "2026-01-03T09:54:00Z",
"transaction_amount_usd": 81431.67
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 149201.23,
"financial_exposure_usd": 241671.35,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106396",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-05T10:36:00Z",
"trace_id": "67491e75-be6a-e95a-63e1-c0c5b2b28a61"
} | {
"account_age_days": 1444,
"account_id": "ACCT-AE896C3BB1C8",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_3",
"session_entropy": 0.808
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 760,
"timestamp": "2026-01-05T10:36:00Z",
"transaction_amount_usd": 779178.15
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.647,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2260787.73,
"financial_exposure_usd": 4499314.97,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105805",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "high",
"timestamp": "2026-01-05T00:45:00Z",
"trace_id": "5d3d7346-54cc-af20-45d1-d0e2bfd4d123"
} | {
"account_age_days": 456,
"account_id": "ACCT-61296566492B",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_3",
"session_entropy": 0.395
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 100,
"timestamp": "2026-01-04T12:50:00Z",
"transaction_amount_usd": 1.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2181942.68,
"financial_exposure_usd": 2449837.42,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100166",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-01T02:46:00Z",
"trace_id": "0d60e364-8851-6447-6e5b-9598a8f0e3e0"
} | {
"account_age_days": 1167,
"account_id": "ACCT-0328A80D9BA5",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_3",
"session_entropy": 0.206
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 768,
"timestamp": "2026-01-01T02:46:00Z",
"transaction_amount_usd": 65215.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 431836.28,
"financial_exposure_usd": 648125.26,
"recoverable_pct": 0.015
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102756",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "high",
"timestamp": "2026-01-02T21:56:00Z",
"trace_id": "80af31d1-3a46-6f0d-3650-b2a57ccfae24"
} | {
"account_age_days": 1369,
"account_id": "ACCT-C67D3084BD23",
"baseline_risk_score": 0.511,
"kyc_tier": "tier_1",
"session_entropy": 0.486
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1142,
"timestamp": "2026-01-02T21:56:00Z",
"transaction_amount_usd": 19320.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 712879.27,
"financial_exposure_usd": 1080062.98,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104015",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-03T18:55:00Z",
"trace_id": "870c1136-bd45-0d55-96fc-d50d6ea7963e"
} | {
"account_age_days": 834,
"account_id": "ACCT-A0E5DFDD6CC9",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_3",
"session_entropy": 0.549
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1199,
"timestamp": "2026-01-03T18:55:00Z",
"transaction_amount_usd": 1554985.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.731,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1873935.63,
"financial_exposure_usd": 2776669.03,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102389",
"label": "fraudulent",
"label_confidence": 0.84,
"severity": "medium",
"timestamp": "2026-01-02T15:49:00Z",
"trace_id": "8727cef8-7675-743e-baed-5d82eecbd414"
} | {
"account_age_days": 1912,
"account_id": "ACCT-9851AA19E5FB",
"baseline_risk_score": 0.6,
"kyc_tier": "tier_2",
"session_entropy": 0.217
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 707,
"timestamp": "2026-01-02T15:49:00Z",
"transaction_amount_usd": 2805.71
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.43,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1183884.36,
"financial_exposure_usd": 1204403.7,
"recoverable_pct": 0.215
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104564",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "high",
"timestamp": "2026-01-04T04:04:00Z",
"trace_id": "d1fd9db6-be2f-12c1-45b7-b15307ab9426"
} | {
"account_age_days": 24,
"account_id": "ACCT-201A957D30BD",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_2",
"session_entropy": 0.856
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 805,
"timestamp": "2026-01-04T04:04:00Z",
"transaction_amount_usd": 2691078.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.873,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5120310.11,
"financial_exposure_usd": 6292817.73,
"recoverable_pct": 0.888
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108851",
"label": "benign",
"label_confidence": 0.695,
"severity": "low",
"timestamp": "2026-01-07T03:31:00Z",
"trace_id": "c1f03a6b-f77f-2338-01e0-acca1ddca96d"
} | {
"account_age_days": 1534,
"account_id": "ACCT-B104410960A5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.446
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 232,
"timestamp": "2026-01-06T17:45:00Z",
"transaction_amount_usd": 12.36
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.553,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3244.34,
"financial_exposure_usd": 3320.93,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105011",
"label": "fraudulent",
"label_confidence": 0.633,
"severity": "low",
"timestamp": "2026-01-04T11:31:00Z",
"trace_id": "66d6affb-7fc8-0990-743c-d68e169f1d02"
} | {
"account_age_days": 1579,
"account_id": "ACCT-0E4B778E068F",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_1",
"session_entropy": 0.854
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 598,
"timestamp": "2026-01-04T11:31:00Z",
"transaction_amount_usd": 2525971.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.882,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2493385.43,
"financial_exposure_usd": 3196353.3,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104651",
"label": "fraudulent",
"label_confidence": 0.79,
"severity": "medium",
"timestamp": "2026-01-04T05:31:00Z",
"trace_id": "ad630629-2742-94ca-e3ae-f7304ed591de"
} | {
"account_age_days": 900,
"account_id": "ACCT-5CEECCE7F74F",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_2",
"session_entropy": 0.57
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 371,
"timestamp": "2026-01-03T22:59:00Z",
"transaction_amount_usd": 0.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.513,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3348686.27,
"financial_exposure_usd": 5016221.63,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107890",
"label": "benign",
"label_confidence": 0.559,
"severity": "medium",
"timestamp": "2026-01-06T11:30:00Z",
"trace_id": "d6ec8d06-1ddf-67b2-784e-c1a6f278506d"
} | {
"account_age_days": 1818,
"account_id": "ACCT-C98BCEEE49CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 203,
"timestamp": "2026-01-06T11:30:00Z",
"transaction_amount_usd": 8288.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.66,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 4018.59,
"financial_exposure_usd": 4281.16,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106947",
"label": "benign",
"label_confidence": 0.488,
"severity": "low",
"timestamp": "2026-01-05T19:47:00Z",
"trace_id": "16e968a5-7db6-1371-241b-7bde445595b6"
} | {
"account_age_days": 692,
"account_id": "ACCT-4CB79B2ECA6B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.134
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1038,
"timestamp": "2026-01-05T19:47:00Z",
"transaction_amount_usd": 5949.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.786,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 972.11,
"financial_exposure_usd": 2061.91,
"recoverable_pct": 0.543
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100686",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "critical",
"timestamp": "2026-01-01T11:26:00Z",
"trace_id": "e4a97ec0-b37d-eb66-5e94-99956d9326e4"
} | {
"account_age_days": 1508,
"account_id": "ACCT-1694EC559E51",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_2",
"session_entropy": 0.528
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 357,
"timestamp": "2026-01-01T04:14:00Z",
"transaction_amount_usd": 20.01
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.575,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 634941.11,
"financial_exposure_usd": 791770.24,
"recoverable_pct": 0.044
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104763",
"label": "fraudulent",
"label_confidence": 0.671,
"severity": "critical",
"timestamp": "2026-01-04T07:23:00Z",
"trace_id": "8cc71bb3-d281-deae-2793-a7712e89950d"
} | {
"account_age_days": 713,
"account_id": "ACCT-4F4827802CB6",
"baseline_risk_score": 0.416,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 486,
"timestamp": "2026-01-04T07:23:00Z",
"transaction_amount_usd": 2879568.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.68,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4353720.73,
"financial_exposure_usd": 4801894.51,
"recoverable_pct": 0.878
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100134",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "medium",
"timestamp": "2026-01-01T02:14:00Z",
"trace_id": "fc00f3e7-4c91-ef0e-644d-852cba3696cc"
} | {
"account_age_days": 1287,
"account_id": "ACCT-6F0EEBEF97E8",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_3",
"session_entropy": 0.924
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1049,
"timestamp": "2026-01-01T02:14:00Z",
"transaction_amount_usd": 19523.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 544395.32,
"financial_exposure_usd": 999783.42,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108718",
"label": "benign",
"label_confidence": 0.69,
"severity": "high",
"timestamp": "2026-01-07T01:18:00Z",
"trace_id": "15d3f373-8ddf-05fc-85f9-4b673c15a87b"
} | {
"account_age_days": 483,
"account_id": "ACCT-C45CBB878326",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_3",
"session_entropy": 0.12
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 204,
"timestamp": "2026-01-06T13:40:00Z",
"transaction_amount_usd": 23.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4832.59,
"financial_exposure_usd": 6028.36,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101080",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "critical",
"timestamp": "2026-01-01T18:00:00Z",
"trace_id": "d15b4b17-fd94-66d3-8d6f-fda779da68a7"
} | {
"account_age_days": 1993,
"account_id": "ACCT-2AF1EE3C9DBF",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.841
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 185,
"timestamp": "2026-01-01T18:00:00Z",
"transaction_amount_usd": 119926.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.721,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 278389.33,
"financial_exposure_usd": 363705.5,
"recoverable_pct": 0.277
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108863",
"label": "benign",
"label_confidence": 0.708,
"severity": "medium",
"timestamp": "2026-01-07T03:43:00Z",
"trace_id": "3e65418c-ad39-b35f-f6ef-b493f9c369fb"
} | {
"account_age_days": 940,
"account_id": "ACCT-3DE18EA618DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.315
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 871,
"timestamp": "2026-01-07T03:43:00Z",
"transaction_amount_usd": 770.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1218.96,
"financial_exposure_usd": 2985.08,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108034",
"label": "benign",
"label_confidence": 0.518,
"severity": "high",
"timestamp": "2026-01-06T13:54:00Z",
"trace_id": "15158ae8-88e6-ab0f-11b1-64eecc918292"
} | {
"account_age_days": 1476,
"account_id": "ACCT-5F22973EE613",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_3",
"session_entropy": 0.319
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 603,
"timestamp": "2026-01-06T13:54:00Z",
"transaction_amount_usd": 3467.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3246.23,
"financial_exposure_usd": 4172.56,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105448",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-04T18:48:00Z",
"trace_id": "1c4b6c02-44c1-d77c-196f-d9dd68f3784b"
} | {
"account_age_days": 497,
"account_id": "ACCT-5C7D1C52F02D",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_2",
"session_entropy": 0.877
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1135,
"timestamp": "2026-01-04T18:48:00Z",
"transaction_amount_usd": 902840.2
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.866,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3551335.06,
"financial_exposure_usd": 7064189.81,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105612",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "high",
"timestamp": "2026-01-04T21:32:00Z",
"trace_id": "228f5ca1-84cd-2742-493c-1c35edf7318a"
} | {
"account_age_days": 1213,
"account_id": "ACCT-71D2B9982E6D",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.341
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 384,
"timestamp": "2026-01-04T17:01:00Z",
"transaction_amount_usd": 0.71
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.502,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2635588.26,
"financial_exposure_usd": 3330402.38,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107718",
"label": "benign",
"label_confidence": 0.521,
"severity": "high",
"timestamp": "2026-01-06T08:38:00Z",
"trace_id": "8a5d60b7-6779-43e4-c85d-dcd2b7fcee7e"
} | {
"account_age_days": 1779,
"account_id": "ACCT-CA73FC0FB0A6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.494
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 245,
"timestamp": "2026-01-06T08:38:00Z",
"transaction_amount_usd": 9289.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.627,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3147.45,
"financial_exposure_usd": 3332.51,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106361",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-05T10:01:00Z",
"trace_id": "64921927-7aee-6c6a-5b7c-904271607de3"
} | {
"account_age_days": 416,
"account_id": "ACCT-C5625E2AD1A8",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.525
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1132,
"timestamp": "2026-01-05T10:01:00Z",
"transaction_amount_usd": 1926335.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.391,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3167606.59,
"financial_exposure_usd": 6814431.77,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101349",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "critical",
"timestamp": "2026-01-01T22:29:00Z",
"trace_id": "9b4be78b-72ff-b3c9-43c5-9889b5f81685"
} | {
"account_age_days": 1647,
"account_id": "ACCT-6BF572C28D0C",
"baseline_risk_score": 0.498,
"kyc_tier": "tier_3",
"session_entropy": 0.108
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 137,
"timestamp": "2026-01-01T18:57:00Z",
"transaction_amount_usd": 18.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.698,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 817605.67,
"financial_exposure_usd": 1272500.61,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101182",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-01T19:42:00Z",
"trace_id": "a7cb5929-61ed-e17c-c536-521689fd6fb2"
} | {
"account_age_days": 293,
"account_id": "ACCT-60A34D40B848",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_3",
"session_entropy": 0.697
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 202,
"timestamp": "2026-01-01T08:31:00Z",
"transaction_amount_usd": 13.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 222502.18,
"financial_exposure_usd": 412197.95,
"recoverable_pct": 0.074
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100525",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "critical",
"timestamp": "2026-01-01T08:45:00Z",
"trace_id": "93c66baf-e6ba-5182-6592-d015b409a852"
} | {
"account_age_days": 1978,
"account_id": "ACCT-C47B0BFA889B",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_1",
"session_entropy": 0.245
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 82,
"timestamp": "2025-12-31T21:58:00Z",
"transaction_amount_usd": 10.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.46,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 951406.38,
"financial_exposure_usd": 990582.22,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108454",
"label": "benign",
"label_confidence": 0.697,
"severity": "high",
"timestamp": "2026-01-06T20:54:00Z",
"trace_id": "e609a330-f934-2dc5-74c0-24a56070d197"
} | {
"account_age_days": 432,
"account_id": "ACCT-C8624E85644F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.287
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 204,
"timestamp": "2026-01-06T20:54:00Z",
"transaction_amount_usd": 6856.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5470.18,
"financial_exposure_usd": 6257.76,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102006",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "medium",
"timestamp": "2026-01-02T09:26:00Z",
"trace_id": "00f0d199-c6b6-3e70-6180-d1ed926aabeb"
} | {
"account_age_days": 1792,
"account_id": "ACCT-6E6126A30A01",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_1",
"session_entropy": 0.537
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 633,
"timestamp": "2026-01-02T09:26:00Z",
"transaction_amount_usd": 51413.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.579,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 504843.65,
"financial_exposure_usd": 769867.15,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102600",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-02T19:20:00Z",
"trace_id": "ebe10934-0c50-149c-f886-f031d4080ff4"
} | {
"account_age_days": 1586,
"account_id": "ACCT-A44D77BEA54F",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_1",
"session_entropy": 0.141
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 235,
"timestamp": "2026-01-02T11:44:00Z",
"transaction_amount_usd": 21.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.393,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 908996.85,
"financial_exposure_usd": 1084302.76,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101556",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-02T01:56:00Z",
"trace_id": "3a2da564-7cb1-95d9-a557-fc9c39deab1d"
} | {
"account_age_days": 615,
"account_id": "ACCT-3BC495D1147E",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_1",
"session_entropy": 0.739
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 292,
"timestamp": "2026-01-01T22:02:00Z",
"transaction_amount_usd": 8.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.42,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 964569.56,
"financial_exposure_usd": 1223053.01,
"recoverable_pct": 0.347
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100311",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "low",
"timestamp": "2026-01-01T05:11:00Z",
"trace_id": "610da84a-34a4-ed3c-7f06-43ea87eb0127"
} | {
"account_age_days": 1829,
"account_id": "ACCT-F2E3E19AF57A",
"baseline_risk_score": 0.607,
"kyc_tier": "tier_1",
"session_entropy": 0.375
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 285,
"timestamp": "2025-12-31T21:15:00Z",
"transaction_amount_usd": 8.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.671,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 688163.91,
"financial_exposure_usd": 1065670.33,
"recoverable_pct": 0.226
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100226",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "medium",
"timestamp": "2026-01-01T03:46:00Z",
"trace_id": "7abdcb0f-d8e0-6ea2-de5e-78e5fb3a3e15"
} | {
"account_age_days": 313,
"account_id": "ACCT-CCAA2CD36AE7",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_2",
"session_entropy": 0.802
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 287,
"timestamp": "2026-01-01T03:46:00Z",
"transaction_amount_usd": 23620.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.691,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 98093.11,
"financial_exposure_usd": 245024.4,
"recoverable_pct": 0.056
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106821",
"label": "benign",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-05T17:41:00Z",
"trace_id": "52364465-114e-6192-96c2-49df659a6eae"
} | {
"account_age_days": 1144,
"account_id": "ACCT-46F6C943B32D",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_2",
"session_entropy": 0.324
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 163,
"timestamp": "2026-01-05T12:21:00Z",
"transaction_amount_usd": 2.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1784.23,
"financial_exposure_usd": 4100.62,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104474",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-04T02:34:00Z",
"trace_id": "79ef35c0-f893-084b-e741-f294bfe57d3f"
} | {
"account_age_days": 1673,
"account_id": "ACCT-3E0D2C595A38",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_1",
"session_entropy": 0.274
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1139,
"timestamp": "2026-01-04T02:34:00Z",
"transaction_amount_usd": 612249.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1982722.87,
"financial_exposure_usd": 2294039.52,
"recoverable_pct": 0.893
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105136",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-04T13:36:00Z",
"trace_id": "68d6318e-b74b-29ce-bfe3-f64bc5771e00"
} | {
"account_age_days": 1091,
"account_id": "ACCT-DC3A392143C0",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_2",
"session_entropy": 0.821
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 614,
"timestamp": "2026-01-04T13:36:00Z",
"transaction_amount_usd": 1695969.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.733,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6148018.11,
"financial_exposure_usd": 6159309.74,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103914",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-03T17:14:00Z",
"trace_id": "733bc62f-35bf-2238-0b8c-79a79aacdce3"
} | {
"account_age_days": 1158,
"account_id": "ACCT-964523B7BD3C",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_2",
"session_entropy": 0.41
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 317,
"timestamp": "2026-01-03T09:33:00Z",
"transaction_amount_usd": 2.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.801,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5153475.33,
"financial_exposure_usd": 5434700.14,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105331",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "medium",
"timestamp": "2026-01-04T16:51:00Z",
"trace_id": "12512fb8-d4f1-dedf-30a3-950fcf9db6cc"
} | {
"account_age_days": 1150,
"account_id": "ACCT-9FD931577CD9",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_1",
"session_entropy": 0.765
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 928,
"timestamp": "2026-01-04T16:51:00Z",
"transaction_amount_usd": 1549441.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.735,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3068253.42,
"financial_exposure_usd": 5236026.88,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104629",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "high",
"timestamp": "2026-01-04T05:09:00Z",
"trace_id": "233c87ac-6fa1-d0db-01fb-e1ebb9f2bb12"
} | {
"account_age_days": 1159,
"account_id": "ACCT-D40F40BA6357",
"baseline_risk_score": 0.288,
"kyc_tier": "tier_3",
"session_entropy": 0.806
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 990,
"timestamp": "2026-01-04T05:09:00Z",
"transaction_amount_usd": 1321885.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.569,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2082780.12,
"financial_exposure_usd": 3080813.75,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109026",
"label": "benign",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-07T06:26:00Z",
"trace_id": "6de5cb97-14bb-cc05-3314-3930557e264f"
} | {
"account_age_days": 914,
"account_id": "ACCT-13322EEDE413",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.61
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 762,
"timestamp": "2026-01-07T06:26:00Z",
"transaction_amount_usd": 7330.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.53,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2911.82,
"financial_exposure_usd": 3911.35,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105472",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "low",
"timestamp": "2026-01-04T19:12:00Z",
"trace_id": "58734957-8364-1083-1c83-f612b9fccc60"
} | {
"account_age_days": 91,
"account_id": "ACCT-73A09EB611F0",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_1",
"session_entropy": 0.775
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 133,
"timestamp": "2026-01-04T19:12:00Z",
"transaction_amount_usd": 1860611.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.38,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2162798.89,
"financial_exposure_usd": 2630225.87,
"recoverable_pct": 0.859
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109834",
"label": "benign",
"label_confidence": 0.68,
"severity": "low",
"timestamp": "2026-01-07T19:54:00Z",
"trace_id": "182a605c-424d-dbc4-d454-9c81360656ae"
} | {
"account_age_days": 987,
"account_id": "ACCT-347861A55401",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.186
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 239,
"timestamp": "2026-01-07T19:54:00Z",
"transaction_amount_usd": 4014.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.625,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3540.73,
"financial_exposure_usd": 7567,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107254",
"label": "benign",
"label_confidence": 0.501,
"severity": "medium",
"timestamp": "2026-01-06T00:54:00Z",
"trace_id": "f25d030d-376c-8087-1fad-a0cfaa1d399f"
} | {
"account_age_days": 282,
"account_id": "ACCT-2408DB0C2F30",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_2",
"session_entropy": 0.544
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 693,
"timestamp": "2026-01-06T00:54:00Z",
"transaction_amount_usd": 10095.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3064.38,
"financial_exposure_usd": 3631.42,
"recoverable_pct": 0.572
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100129",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "medium",
"timestamp": "2026-01-01T02:09:00Z",
"trace_id": "2d2ae08e-6c8c-5d0e-3eb3-66fd3291bc95"
} | {
"account_age_days": 1003,
"account_id": "ACCT-593C73F2B8E5",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_3",
"session_entropy": 0.533
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 326,
"timestamp": "2025-12-31T15:15:00Z",
"transaction_amount_usd": 15.89
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 926826.02,
"financial_exposure_usd": 969573.29,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104116",
"label": "fraudulent",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-03T20:36:00Z",
"trace_id": "fe838a0a-ce77-528c-b1e9-ef03721f1644"
} | {
"account_age_days": 761,
"account_id": "ACCT-1B88B4F4A38C",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_1",
"session_entropy": 0.919
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 370,
"timestamp": "2026-01-03T14:30:00Z",
"transaction_amount_usd": 23.8
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.941,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1790925.63,
"financial_exposure_usd": 2259281.06,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106554",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "critical",
"timestamp": "2026-01-05T13:14:00Z",
"trace_id": "00cd98d1-14f1-50ac-3211-6758c659351e"
} | {
"account_age_days": 1452,
"account_id": "ACCT-F5A8991FA68F",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_2",
"session_entropy": 0.795
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 497,
"timestamp": "2026-01-05T13:14:00Z",
"transaction_amount_usd": 1348695.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.899,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 924940.39,
"financial_exposure_usd": 1138999.18,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106337",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "medium",
"timestamp": "2026-01-05T09:37:00Z",
"trace_id": "fd97c1a6-7c46-820a-fe24-f732164ba4ce"
} | {
"account_age_days": 1902,
"account_id": "ACCT-1585E96F07BA",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_3",
"session_entropy": 0.595
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 311,
"timestamp": "2026-01-05T09:37:00Z",
"transaction_amount_usd": 2264601.97
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.457,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2947763.56,
"financial_exposure_usd": 3654488.78,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107385",
"label": "benign",
"label_confidence": 0.741,
"severity": "medium",
"timestamp": "2026-01-06T03:05:00Z",
"trace_id": "861d6d7f-c0a2-26bf-ad8a-2ad982b3dfe9"
} | {
"account_age_days": 1992,
"account_id": "ACCT-B4CF0229DE81",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.187
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 353,
"timestamp": "2026-01-06T03:05:00Z",
"transaction_amount_usd": 3940.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4212.77,
"financial_exposure_usd": 7471.29,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102578",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "high",
"timestamp": "2026-01-02T18:58:00Z",
"trace_id": "5a883554-f9ab-08f1-d1eb-bb454b36c66c"
} | {
"account_age_days": 229,
"account_id": "ACCT-1AE38135135D",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_1",
"session_entropy": 0.646
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1068,
"timestamp": "2026-01-02T18:58:00Z",
"transaction_amount_usd": 25907.27
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.426,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 132238.56,
"financial_exposure_usd": 320710.49,
"recoverable_pct": 0.116
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108001",
"label": "benign",
"label_confidence": 0.618,
"severity": "low",
"timestamp": "2026-01-06T13:21:00Z",
"trace_id": "739fd048-0748-a5db-35cd-646b9fe9b910"
} | {
"account_age_days": 1670,
"account_id": "ACCT-1F2350C88BC8",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_3",
"session_entropy": 0.877
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 908,
"timestamp": "2026-01-06T13:21:00Z",
"transaction_amount_usd": 7186.41
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1544.1,
"financial_exposure_usd": 2144.06,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105949",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "medium",
"timestamp": "2026-01-05T03:09:00Z",
"trace_id": "3957a216-2786-b9e8-94cc-648e5427d297"
} | {
"account_age_days": 1099,
"account_id": "ACCT-B0677CA11604",
"baseline_risk_score": 0.224,
"kyc_tier": "tier_1",
"session_entropy": 0.885
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 908,
"timestamp": "2026-01-05T03:09:00Z",
"transaction_amount_usd": 1890193.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.912,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2796978.03,
"financial_exposure_usd": 3347351.25,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104489",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-04T02:49:00Z",
"trace_id": "92b46d85-2bef-7e8b-04f2-722a8cc9564c"
} | {
"account_age_days": 1760,
"account_id": "ACCT-14A5231A756D",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.55
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 158,
"timestamp": "2026-01-03T19:02:00Z",
"transaction_amount_usd": 21.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.673,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1265014.71,
"financial_exposure_usd": 2408186.45,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107555",
"label": "benign",
"label_confidence": 0.608,
"severity": "low",
"timestamp": "2026-01-06T05:55:00Z",
"trace_id": "02afd20e-4cee-5698-856e-6079de865bd9"
} | {
"account_age_days": 1494,
"account_id": "ACCT-6182948F7359",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_3",
"session_entropy": 0.947
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 521,
"timestamp": "2026-01-06T05:55:00Z",
"transaction_amount_usd": 8043.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 247.52,
"financial_exposure_usd": 423.45,
"recoverable_pct": 0.921
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.