schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104233",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "critical",
"timestamp": "2026-01-03T22:33:00Z",
"trace_id": "9dd26560-6f18-d959-5c79-e84307be2ec9"
} | {
"account_age_days": 809,
"account_id": "ACCT-D6D740852563",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.931
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 925,
"timestamp": "2026-01-03T22:33:00Z",
"transaction_amount_usd": 952062.56
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.613,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1416481.33,
"financial_exposure_usd": 2171758.55,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107723",
"label": "benign",
"label_confidence": 0.629,
"severity": "medium",
"timestamp": "2026-01-06T08:43:00Z",
"trace_id": "38ba6c62-6c6f-9177-a3fd-ec6fe4456641"
} | {
"account_age_days": 1578,
"account_id": "ACCT-67AEB81FAC53",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 191,
"timestamp": "2026-01-06T08:43:00Z",
"transaction_amount_usd": 8407.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2148.21,
"financial_exposure_usd": 2543.51,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109710",
"label": "benign",
"label_confidence": 0.486,
"severity": "medium",
"timestamp": "2026-01-07T17:50:00Z",
"trace_id": "532745d5-e97b-58c5-3105-27837a080160"
} | {
"account_age_days": 631,
"account_id": "ACCT-AA411F19045C",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_2",
"session_entropy": 0.944
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 682,
"timestamp": "2026-01-07T17:50:00Z",
"transaction_amount_usd": 3600.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.512,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3956.35,
"financial_exposure_usd": 4850.21,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103443",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "medium",
"timestamp": "2026-01-03T09:23:00Z",
"trace_id": "afeda6f3-a44d-ff3c-90fc-8ee19be0c3e4"
} | {
"account_age_days": 60,
"account_id": "ACCT-910B69BE8132",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_1",
"session_entropy": 0.533
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 560,
"timestamp": "2026-01-03T09:23:00Z",
"transaction_amount_usd": 209183.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.825,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1773477.1,
"financial_exposure_usd": 4033390.51,
"recoverable_pct": 0.612
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105704",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-04T23:04:00Z",
"trace_id": "c29ee78d-dd54-ffd0-f88c-6cb2014f67f1"
} | {
"account_age_days": 1011,
"account_id": "ACCT-4E460390605C",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_1",
"session_entropy": 0.637
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 318,
"timestamp": "2026-01-04T17:16:00Z",
"transaction_amount_usd": 0.54
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.484,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5398185.25,
"financial_exposure_usd": 10613124.71,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109242",
"label": "benign",
"label_confidence": 0.642,
"severity": "high",
"timestamp": "2026-01-07T10:02:00Z",
"trace_id": "e0768e36-f34e-d476-fa34-ad663caf321f"
} | {
"account_age_days": 45,
"account_id": "ACCT-4652BF577CAE",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.94
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 232,
"timestamp": "2026-01-07T06:00:00Z",
"transaction_amount_usd": 0.96
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 732.22,
"financial_exposure_usd": 1345.19,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109322",
"label": "benign",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-07T11:22:00Z",
"trace_id": "4a48747a-f7e0-a571-4ff1-2546c80b0a12"
} | {
"account_age_days": 787,
"account_id": "ACCT-D2FE2DAA61F7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.609
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 792,
"timestamp": "2026-01-07T11:22:00Z",
"transaction_amount_usd": 5122.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2027.04,
"financial_exposure_usd": 2273.29,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106381",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-05T10:21:00Z",
"trace_id": "f087f690-518d-1797-e892-fd5e41d6be33"
} | {
"account_age_days": 94,
"account_id": "ACCT-25C5AA1EA434",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.347
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 262,
"timestamp": "2026-01-05T06:33:00Z",
"transaction_amount_usd": 3.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2634501.31,
"financial_exposure_usd": 5743706.37,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103682",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "medium",
"timestamp": "2026-01-03T13:22:00Z",
"trace_id": "ce073a44-f21b-20ba-e2c1-910f1b6b8c10"
} | {
"account_age_days": 1821,
"account_id": "ACCT-1A4CB3541BAC",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_1",
"session_entropy": 0.179
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 401,
"timestamp": "2026-01-03T13:22:00Z",
"transaction_amount_usd": 483124.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5227451.26,
"financial_exposure_usd": 5405814.34,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109277",
"label": "benign",
"label_confidence": 0.685,
"severity": "medium",
"timestamp": "2026-01-07T10:37:00Z",
"trace_id": "e73e161f-68f9-99cf-eafa-bc942ff16363"
} | {
"account_age_days": 1590,
"account_id": "ACCT-C3C688B50B9E",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_3",
"session_entropy": 0.437
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 397,
"timestamp": "2026-01-07T10:37:00Z",
"transaction_amount_usd": 2697.72
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3247.96,
"financial_exposure_usd": 4818.62,
"recoverable_pct": 0.462
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102827",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "low",
"timestamp": "2026-01-02T23:07:00Z",
"trace_id": "25e2a0d2-dfb3-5d32-e06c-56dab30bd9b0"
} | {
"account_age_days": 219,
"account_id": "ACCT-57A9CC59F319",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_1",
"session_entropy": 0.807
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 243,
"timestamp": "2026-01-02T23:07:00Z",
"transaction_amount_usd": 116648.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.453,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 287205.06,
"financial_exposure_usd": 541062.82,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104001",
"label": "fraudulent",
"label_confidence": 0.712,
"severity": "high",
"timestamp": "2026-01-03T18:41:00Z",
"trace_id": "eb47934e-56f9-0436-1fbb-0f25598f3355"
} | {
"account_age_days": 443,
"account_id": "ACCT-7F7912303693",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_2",
"session_entropy": 0.892
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 330,
"timestamp": "2026-01-03T18:41:00Z",
"transaction_amount_usd": 2640511.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.916,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5048086.26,
"financial_exposure_usd": 5819971.26,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104588",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "medium",
"timestamp": "2026-01-04T04:28:00Z",
"trace_id": "b68c88ef-0919-d2ba-f35f-bc2aa444a9c1"
} | {
"account_age_days": 1919,
"account_id": "ACCT-31924EF801E4",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1079,
"timestamp": "2026-01-04T04:28:00Z",
"transaction_amount_usd": 2274369.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2127640.96,
"financial_exposure_usd": 2480941.89,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105567",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "low",
"timestamp": "2026-01-04T20:47:00Z",
"trace_id": "36fdf845-33ba-45e2-d9bd-edb57199faed"
} | {
"account_age_days": 1473,
"account_id": "ACCT-B2A92114655A",
"baseline_risk_score": 0.233,
"kyc_tier": "tier_2",
"session_entropy": 0.704
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 839,
"timestamp": "2026-01-04T20:47:00Z",
"transaction_amount_usd": 1510263.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.74,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1626428.66,
"financial_exposure_usd": 4001535.34,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100690",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "low",
"timestamp": "2026-01-01T11:30:00Z",
"trace_id": "2ed5d9fb-58b8-aa20-3849-bae692b94a30"
} | {
"account_age_days": 1269,
"account_id": "ACCT-8742D40F7400",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_1",
"session_entropy": 0.552
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 297,
"timestamp": "2026-01-01T11:30:00Z",
"transaction_amount_usd": 44316.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.503,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 445608.03,
"financial_exposure_usd": 1051922.48,
"recoverable_pct": 0.39
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105151",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "medium",
"timestamp": "2026-01-04T13:51:00Z",
"trace_id": "19b31ab2-6e44-e560-2852-dfb5014c0324"
} | {
"account_age_days": 263,
"account_id": "ACCT-503B7AA04060",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_3",
"session_entropy": 0.495
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 286,
"timestamp": "2026-01-04T13:51:00Z",
"transaction_amount_usd": 230743.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.556,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1073444.63,
"financial_exposure_usd": 2683084.99,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101128",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "critical",
"timestamp": "2026-01-01T18:48:00Z",
"trace_id": "82abc46d-4c9b-aa87-79df-14793aec8e74"
} | {
"account_age_days": 1147,
"account_id": "ACCT-38DE929F5AA2",
"baseline_risk_score": 0.549,
"kyc_tier": "tier_3",
"session_entropy": 0.527
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 1103,
"timestamp": "2026-01-01T18:48:00Z",
"transaction_amount_usd": 14603.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.54,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 671858.34,
"financial_exposure_usd": 1033429.46,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100582",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "medium",
"timestamp": "2026-01-01T09:42:00Z",
"trace_id": "03a7f3d8-c4fd-264e-839f-4d7a26f9c85d"
} | {
"account_age_days": 1518,
"account_id": "ACCT-6A216452C62D",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_3",
"session_entropy": 0.735
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 661,
"timestamp": "2026-01-01T09:42:00Z",
"transaction_amount_usd": 84269.35
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.46,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 1098882.43,
"financial_exposure_usd": 1175770.65,
"recoverable_pct": 0.252
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100596",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "medium",
"timestamp": "2026-01-01T09:56:00Z",
"trace_id": "ddccdad0-ab64-6f50-37b2-ae27e48175c9"
} | {
"account_age_days": 708,
"account_id": "ACCT-9B7A69CCBD51",
"baseline_risk_score": 0.612,
"kyc_tier": "tier_2",
"session_entropy": 0.698
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1194,
"timestamp": "2026-01-01T09:56:00Z",
"transaction_amount_usd": 100853.96
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.851,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 196898.75,
"financial_exposure_usd": 396494.03,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109602",
"label": "benign",
"label_confidence": 0.503,
"severity": "low",
"timestamp": "2026-01-07T16:02:00Z",
"trace_id": "747edfd1-ca87-ec3f-4f0c-39d04121604d"
} | {
"account_age_days": 281,
"account_id": "ACCT-92E7D69348CF",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_1",
"session_entropy": 0.765
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 571,
"timestamp": "2026-01-07T16:02:00Z",
"transaction_amount_usd": 4333.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2492.65,
"financial_exposure_usd": 2516.37,
"recoverable_pct": 0.611
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103404",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-03T08:44:00Z",
"trace_id": "b2aa3d1d-481d-2539-915c-c15ad4b9739b"
} | {
"account_age_days": 149,
"account_id": "ACCT-1DF49A7B60EC",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.813
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1184,
"timestamp": "2026-01-03T08:44:00Z",
"transaction_amount_usd": 442169.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3624916.18,
"financial_exposure_usd": 5184526.79,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104507",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-04T03:07:00Z",
"trace_id": "d2b2a189-2ede-93d2-6f22-2fc84d302b7a"
} | {
"account_age_days": 1985,
"account_id": "ACCT-B91A5DD5258B",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_1",
"session_entropy": 0.3
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 990,
"timestamp": "2026-01-04T03:07:00Z",
"transaction_amount_usd": 1273680.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.852,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3540773.98,
"financial_exposure_usd": 5042644.03,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101964",
"label": "fraudulent",
"label_confidence": 0.88,
"severity": "low",
"timestamp": "2026-01-02T08:44:00Z",
"trace_id": "caa50b64-6f55-4877-02d9-8839ca14218d"
} | {
"account_age_days": 553,
"account_id": "ACCT-0A880AA2B325",
"baseline_risk_score": 0.597,
"kyc_tier": "tier_1",
"session_entropy": 0.139
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 672,
"timestamp": "2026-01-02T08:44:00Z",
"transaction_amount_usd": 112713.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.795,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 285732.14,
"financial_exposure_usd": 368544.98,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108979",
"label": "benign",
"label_confidence": 0.552,
"severity": "medium",
"timestamp": "2026-01-07T05:39:00Z",
"trace_id": "19c8fe4c-4eeb-576c-801a-fa1dc0b7ec6f"
} | {
"account_age_days": 673,
"account_id": "ACCT-8FF3D7FCB9C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.942
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 296,
"timestamp": "2026-01-07T05:39:00Z",
"transaction_amount_usd": 7094.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1686.51,
"financial_exposure_usd": 3566.48,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103026",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "medium",
"timestamp": "2026-01-03T02:26:00Z",
"trace_id": "9629ef5f-e5f8-78a2-beec-95fb2b31adac"
} | {
"account_age_days": 1603,
"account_id": "ACCT-6B5FFF07163A",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.323
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 994,
"timestamp": "2026-01-03T02:26:00Z",
"transaction_amount_usd": 36183.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.771,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 301270.56,
"financial_exposure_usd": 573882.39,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103786",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-03T15:06:00Z",
"trace_id": "79fae7fa-83d0-078d-e7fd-376faba88e10"
} | {
"account_age_days": 402,
"account_id": "ACCT-3A68865E5299",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_3",
"session_entropy": 0.935
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 940,
"timestamp": "2026-01-03T15:06:00Z",
"transaction_amount_usd": 1019503.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.738,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5120097.99,
"financial_exposure_usd": 6586682.73,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104429",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "high",
"timestamp": "2026-01-04T01:49:00Z",
"trace_id": "2391b778-eed3-d7e5-6b85-22ee60ee4ebd"
} | {
"account_age_days": 1341,
"account_id": "ACCT-51D692956667",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_3",
"session_entropy": 0.508
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 289,
"timestamp": "2026-01-03T16:18:00Z",
"transaction_amount_usd": 17
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1289186.7,
"financial_exposure_usd": 1792706.68,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106785",
"label": "benign",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-05T17:05:00Z",
"trace_id": "bbb4a5ab-11e6-cc62-17f4-831fc27421b9"
} | {
"account_age_days": 126,
"account_id": "ACCT-A50E873BF1AF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.497
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 342,
"timestamp": "2026-01-05T17:05:00Z",
"transaction_amount_usd": 7055.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.551,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1025.06,
"financial_exposure_usd": 1791.35,
"recoverable_pct": 0.815
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104665",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "critical",
"timestamp": "2026-01-04T05:45:00Z",
"trace_id": "337975e3-e1a3-3a02-7cd3-6360323b9065"
} | {
"account_age_days": 931,
"account_id": "ACCT-1FF72F37B65F",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_1",
"session_entropy": 0.102
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1187,
"timestamp": "2026-01-04T05:45:00Z",
"transaction_amount_usd": 1654297.27
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.479,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1110213.47,
"financial_exposure_usd": 2015077.87,
"recoverable_pct": 0.73
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109108",
"label": "benign",
"label_confidence": 0.693,
"severity": "medium",
"timestamp": "2026-01-07T07:48:00Z",
"trace_id": "c99a768b-420e-2715-199e-db55ce1e5118"
} | {
"account_age_days": 1274,
"account_id": "ACCT-4206A289F14C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.125
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 816,
"timestamp": "2026-01-07T07:48:00Z",
"transaction_amount_usd": 11782.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2191.45,
"financial_exposure_usd": 3207.8,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105149",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "low",
"timestamp": "2026-01-04T13:49:00Z",
"trace_id": "6322a841-bedf-c591-0519-415ba52acef6"
} | {
"account_age_days": 1505,
"account_id": "ACCT-C25A898C97CE",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_3",
"session_entropy": 0.787
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 763,
"timestamp": "2026-01-04T13:49:00Z",
"transaction_amount_usd": 1740112.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4230736.84,
"financial_exposure_usd": 6049682.25,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106639",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "medium",
"timestamp": "2026-01-05T14:39:00Z",
"trace_id": "2682391c-9de9-3f4b-b977-2e447e952836"
} | {
"account_age_days": 589,
"account_id": "ACCT-D7065638704F",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_2",
"session_entropy": 0.93
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 164,
"timestamp": "2026-01-05T13:39:00Z",
"transaction_amount_usd": 23.26
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.577,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2996214.41,
"financial_exposure_usd": 3128912.25,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106539",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "critical",
"timestamp": "2026-01-05T12:59:00Z",
"trace_id": "89a112a8-0d54-236b-3a28-18b0abbe27f0"
} | {
"account_age_days": 410,
"account_id": "ACCT-44B08AE532FD",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_1",
"session_entropy": 0.337
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 893,
"timestamp": "2026-01-05T12:59:00Z",
"transaction_amount_usd": 950820.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 2731391.08,
"financial_exposure_usd": 4247376.19,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107662",
"label": "benign",
"label_confidence": 0.583,
"severity": "medium",
"timestamp": "2026-01-06T07:42:00Z",
"trace_id": "fc0b6fbb-b741-c110-8afc-9ba8018d598a"
} | {
"account_age_days": 1664,
"account_id": "ACCT-562E5F02B347",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_1",
"session_entropy": 0.454
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 545,
"timestamp": "2026-01-06T07:42:00Z",
"transaction_amount_usd": 11176.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.678,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2114.02,
"financial_exposure_usd": 4605.68,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108999",
"label": "benign",
"label_confidence": 0.502,
"severity": "medium",
"timestamp": "2026-01-07T05:59:00Z",
"trace_id": "3408061d-5014-53f0-1342-c077390d3acd"
} | {
"account_age_days": 1496,
"account_id": "ACCT-BEAFD51FABDA",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_2",
"session_entropy": 0.62
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 545,
"timestamp": "2026-01-07T05:59:00Z",
"transaction_amount_usd": 2026.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1661.61,
"financial_exposure_usd": 2404.32,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103733",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "high",
"timestamp": "2026-01-03T14:13:00Z",
"trace_id": "9d0fd5d8-22a0-228c-0bc9-bec546713a26"
} | {
"account_age_days": 1461,
"account_id": "ACCT-2E412EB874B4",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.519
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1090,
"timestamp": "2026-01-03T14:13:00Z",
"transaction_amount_usd": 756479.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.9,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 3325910.79,
"financial_exposure_usd": 3359605.2,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106362",
"label": "fraudulent",
"label_confidence": 0.647,
"severity": "critical",
"timestamp": "2026-01-05T10:02:00Z",
"trace_id": "ed7907fe-95f1-6f00-549a-400690899ab1"
} | {
"account_age_days": 98,
"account_id": "ACCT-6D89106F4FFC",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_3",
"session_entropy": 0.866
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 202,
"timestamp": "2026-01-05T10:02:00Z",
"transaction_amount_usd": 1491259.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.408,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 940623.75,
"financial_exposure_usd": 1465927.27,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108638",
"label": "benign",
"label_confidence": 0.564,
"severity": "low",
"timestamp": "2026-01-06T23:58:00Z",
"trace_id": "b5a887ef-0bf1-da0d-6219-cb9812950a04"
} | {
"account_age_days": 1333,
"account_id": "ACCT-72C59F1E4D41",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.707
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 145,
"timestamp": "2026-01-06T13:15:00Z",
"transaction_amount_usd": 9.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.61,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 3220.3,
"financial_exposure_usd": 3324.76,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108302",
"label": "benign",
"label_confidence": 0.576,
"severity": "high",
"timestamp": "2026-01-06T18:22:00Z",
"trace_id": "b5f13136-8579-a0b3-a2d7-fefd50cc466e"
} | {
"account_age_days": 900,
"account_id": "ACCT-1FF86DA2B869",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_1",
"session_entropy": 0.926
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 216,
"timestamp": "2026-01-06T18:22:00Z",
"transaction_amount_usd": 10871.38
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2721.22,
"financial_exposure_usd": 5113.41,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102047",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-02T10:07:00Z",
"trace_id": "8c28e182-c1df-e10b-2844-3b78ed52c296"
} | {
"account_age_days": 880,
"account_id": "ACCT-094B5A772E84",
"baseline_risk_score": 0.51,
"kyc_tier": "tier_3",
"session_entropy": 0.326
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 579,
"timestamp": "2026-01-02T10:07:00Z",
"transaction_amount_usd": 56371.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 337773.8,
"financial_exposure_usd": 566055.84,
"recoverable_pct": 0.043
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109639",
"label": "benign",
"label_confidence": 0.694,
"severity": "high",
"timestamp": "2026-01-07T16:39:00Z",
"trace_id": "b31ddc4c-1965-d96b-a390-c31f89faac80"
} | {
"account_age_days": 1253,
"account_id": "ACCT-D2DEA40C302D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.656
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 750,
"timestamp": "2026-01-07T16:39:00Z",
"transaction_amount_usd": 9701.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2878.4,
"financial_exposure_usd": 3252.55,
"recoverable_pct": 0.438
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103985",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-03T18:25:00Z",
"trace_id": "90c82f7a-d69d-5b9d-2ce5-1b1af439c7a5"
} | {
"account_age_days": 157,
"account_id": "ACCT-9DE65341E0F0",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1135,
"timestamp": "2026-01-03T18:25:00Z",
"transaction_amount_usd": 2064843.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.369,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2029862.54,
"financial_exposure_usd": 4383756.34,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107443",
"label": "benign",
"label_confidence": 0.504,
"severity": "medium",
"timestamp": "2026-01-06T04:03:00Z",
"trace_id": "4883fe53-6d83-4b45-c16a-86fafe4f2d97"
} | {
"account_age_days": 20,
"account_id": "ACCT-E95FDAABEB32",
"baseline_risk_score": 0.13,
"kyc_tier": "tier_1",
"session_entropy": 0.611
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 163,
"timestamp": "2026-01-06T04:03:00Z",
"transaction_amount_usd": 6434.46
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 465.09,
"financial_exposure_usd": 523.34,
"recoverable_pct": 0.436
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107040",
"label": "benign",
"label_confidence": 0.557,
"severity": "low",
"timestamp": "2026-01-05T21:20:00Z",
"trace_id": "f9b2c18c-fa1e-6be7-c5f7-b25f22160017"
} | {
"account_age_days": 884,
"account_id": "ACCT-FF3F46FD528B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.92
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1061,
"timestamp": "2026-01-05T21:20:00Z",
"transaction_amount_usd": 13706.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.464,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1298.38,
"financial_exposure_usd": 2128.77,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100106",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-01T01:46:00Z",
"trace_id": "d3a71b83-97d0-2f8f-affd-d43b2c691f04"
} | {
"account_age_days": 760,
"account_id": "ACCT-737335549E20",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_3",
"session_entropy": 0.871
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 852,
"timestamp": "2026-01-01T01:46:00Z",
"transaction_amount_usd": 24240.31
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.401,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 690979.69,
"financial_exposure_usd": 1439772.1,
"recoverable_pct": 0.275
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109568",
"label": "benign",
"label_confidence": 0.745,
"severity": "low",
"timestamp": "2026-01-07T15:28:00Z",
"trace_id": "a7cf990d-2953-82fa-d6d7-79e9c0fa8855"
} | {
"account_age_days": 1421,
"account_id": "ACCT-68F04DC76AC4",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_1",
"session_entropy": 0.179
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 369,
"timestamp": "2026-01-07T15:28:00Z",
"transaction_amount_usd": 4157.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3800.56,
"financial_exposure_usd": 4364.64,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109913",
"label": "benign",
"label_confidence": 0.49,
"severity": "medium",
"timestamp": "2026-01-07T21:13:00Z",
"trace_id": "10e81e70-c705-716e-d884-7c65876d07ce"
} | {
"account_age_days": 1760,
"account_id": "ACCT-DE83A73A69AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 170,
"timestamp": "2026-01-07T12:51:00Z",
"transaction_amount_usd": 14.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 979.73,
"financial_exposure_usd": 1204.58,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107192",
"label": "benign",
"label_confidence": 0.483,
"severity": "low",
"timestamp": "2026-01-05T23:52:00Z",
"trace_id": "8bf87f0d-95c4-d7b8-7d8a-62d0501ece6b"
} | {
"account_age_days": 1835,
"account_id": "ACCT-665B289019B1",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 866,
"timestamp": "2026-01-05T23:52:00Z",
"transaction_amount_usd": 1818.2
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2128.12,
"financial_exposure_usd": 3558.09,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101632",
"label": "fraudulent",
"label_confidence": 0.927,
"severity": "low",
"timestamp": "2026-01-02T03:12:00Z",
"trace_id": "79d8b8f5-af7f-dc36-0dee-a7a1bf77d93e"
} | {
"account_age_days": 1959,
"account_id": "ACCT-8E0D3818DC4C",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_3",
"session_entropy": 0.475
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 381,
"timestamp": "2026-01-01T20:53:00Z",
"transaction_amount_usd": 21.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.364,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 490558.05,
"financial_exposure_usd": 867262.89,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104586",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-04T04:26:00Z",
"trace_id": "8907674a-2cf3-dbce-6a9b-8153dccf3de7"
} | {
"account_age_days": 1471,
"account_id": "ACCT-3EB105288C63",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_3",
"session_entropy": 0.891
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 173,
"timestamp": "2026-01-04T01:38:00Z",
"transaction_amount_usd": 22.87
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.713,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3272012.33,
"financial_exposure_usd": 7121840.35,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105587",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "high",
"timestamp": "2026-01-04T21:07:00Z",
"trace_id": "50597b1e-fcf3-bbf5-f7b8-3230295b4a47"
} | {
"account_age_days": 964,
"account_id": "ACCT-C42F3347A973",
"baseline_risk_score": 0.316,
"kyc_tier": "tier_2",
"session_entropy": 0.792
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1174,
"timestamp": "2026-01-04T21:07:00Z",
"transaction_amount_usd": 80968.37
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.643,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2071430.38,
"financial_exposure_usd": 3098752.57,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101355",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "medium",
"timestamp": "2026-01-01T22:35:00Z",
"trace_id": "8299b3f0-6306-97c8-df47-bc996262d60d"
} | {
"account_age_days": 1121,
"account_id": "ACCT-AA1180737ADB",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_3",
"session_entropy": 0.365
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 569,
"timestamp": "2026-01-01T22:35:00Z",
"transaction_amount_usd": 29916.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.641,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 761435.1,
"financial_exposure_usd": 1001176.96,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106882",
"label": "benign",
"label_confidence": 0.479,
"severity": "low",
"timestamp": "2026-01-05T18:42:00Z",
"trace_id": "83ee6659-b518-8d7e-37a6-3a468a2fbe76"
} | {
"account_age_days": 1082,
"account_id": "ACCT-6DF386EDB8FE",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_1",
"session_entropy": 0.474
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 319,
"timestamp": "2026-01-05T15:03:00Z",
"transaction_amount_usd": 18.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2371.66,
"financial_exposure_usd": 2661.41,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107978",
"label": "benign",
"label_confidence": 0.484,
"severity": "low",
"timestamp": "2026-01-06T12:58:00Z",
"trace_id": "1bc8dae9-97e0-e169-fb06-d4cb55182ad6"
} | {
"account_age_days": 1276,
"account_id": "ACCT-1BD453DAC4DC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.896
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1042,
"timestamp": "2026-01-06T12:58:00Z",
"transaction_amount_usd": 345.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1136,
"financial_exposure_usd": 2062.98,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104243",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "medium",
"timestamp": "2026-01-03T22:43:00Z",
"trace_id": "5e6b1e56-4439-8559-aeb2-fd62ca02b57c"
} | {
"account_age_days": 1513,
"account_id": "ACCT-2558BEA8A110",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.812
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 158,
"timestamp": "2026-01-03T22:43:00Z",
"transaction_amount_usd": 254085.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.506,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4942382.58,
"financial_exposure_usd": 7815996.53,
"recoverable_pct": 0.659
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101248",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "critical",
"timestamp": "2026-01-01T20:48:00Z",
"trace_id": "86b55a1d-8472-1864-6e2c-cdd153942509"
} | {
"account_age_days": 1633,
"account_id": "ACCT-4BB69AB8ED1C",
"baseline_risk_score": 0.488,
"kyc_tier": "tier_3",
"session_entropy": 0.404
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 386,
"timestamp": "2026-01-01T08:20:00Z",
"transaction_amount_usd": 21.33
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.888,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 486396.52,
"financial_exposure_usd": 543214.51,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106731",
"label": "benign",
"label_confidence": 0.528,
"severity": "low",
"timestamp": "2026-01-05T16:11:00Z",
"trace_id": "e38c1b95-8785-1469-20e9-f38cee017454"
} | {
"account_age_days": 1345,
"account_id": "ACCT-E6B92DE2042A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 312,
"timestamp": "2026-01-05T16:11:00Z",
"transaction_amount_usd": 3963.28
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1379.66,
"financial_exposure_usd": 1522.4,
"recoverable_pct": 0.975
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102965",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "high",
"timestamp": "2026-01-03T01:25:00Z",
"trace_id": "2443e113-b516-438e-eb90-e00a549b2374"
} | {
"account_age_days": 1157,
"account_id": "ACCT-885AC90D3B9C",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_3",
"session_entropy": 0.552
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 336,
"timestamp": "2026-01-02T19:41:00Z",
"transaction_amount_usd": 17.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 573127.92,
"financial_exposure_usd": 660632.78,
"recoverable_pct": 0.324
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104491",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-04T02:51:00Z",
"trace_id": "a6cbd2d4-bbd2-0b45-29af-575e04062349"
} | {
"account_age_days": 1119,
"account_id": "ACCT-449186EBD972",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.52
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1041,
"timestamp": "2026-01-04T02:51:00Z",
"transaction_amount_usd": 372759.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.756,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3370863.06,
"financial_exposure_usd": 3825072.15,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109158",
"label": "benign",
"label_confidence": 0.7,
"severity": "low",
"timestamp": "2026-01-07T08:38:00Z",
"trace_id": "dfa442a6-9fbb-d1fe-3a7c-e5b8b5856e85"
} | {
"account_age_days": 132,
"account_id": "ACCT-C8A979E7B694",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.631
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 536,
"timestamp": "2026-01-07T08:38:00Z",
"transaction_amount_usd": 7500.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.798,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 319.98,
"financial_exposure_usd": 488.66,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104351",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-04T00:31:00Z",
"trace_id": "c8f0ca91-f066-89b6-ec8d-f2aea3be26cd"
} | {
"account_age_days": 1553,
"account_id": "ACCT-3011EE1418AE",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_1",
"session_entropy": 0.355
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 802,
"timestamp": "2026-01-04T00:31:00Z",
"transaction_amount_usd": 2445163.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.635,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3252476.75,
"financial_exposure_usd": 6013895.45,
"recoverable_pct": 0.457
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106770",
"label": "benign",
"label_confidence": 0.582,
"severity": "low",
"timestamp": "2026-01-05T16:50:00Z",
"trace_id": "588c4c91-5eb0-6447-8b54-d19588478d76"
} | {
"account_age_days": 555,
"account_id": "ACCT-D56359C7DDA4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.167
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 343,
"timestamp": "2026-01-05T10:44:00Z",
"transaction_amount_usd": 8.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.659,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1848.26,
"financial_exposure_usd": 2734.37,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109970",
"label": "benign",
"label_confidence": 0.566,
"severity": "high",
"timestamp": "2026-01-07T22:10:00Z",
"trace_id": "58a77cdc-d029-eb5a-e775-e3d13f1d103d"
} | {
"account_age_days": 773,
"account_id": "ACCT-60BFF73FC1AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.159
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 688,
"timestamp": "2026-01-07T22:10:00Z",
"transaction_amount_usd": 1270.78
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.472,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1300.41,
"financial_exposure_usd": 1408.35,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105427",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "low",
"timestamp": "2026-01-04T18:27:00Z",
"trace_id": "59104693-148e-d5c6-c914-cbec6167f7f7"
} | {
"account_age_days": 1082,
"account_id": "ACCT-70D3606EC0FE",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_2",
"session_entropy": 0.372
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 333,
"timestamp": "2026-01-04T06:10:00Z",
"transaction_amount_usd": 2.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.587,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5247672.35,
"financial_exposure_usd": 5623997.73,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101975",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "medium",
"timestamp": "2026-01-02T08:55:00Z",
"trace_id": "4dd23a51-f7aa-1c05-8cb9-2f59fe2d8261"
} | {
"account_age_days": 832,
"account_id": "ACCT-61A0341DDFEF",
"baseline_risk_score": 0.409,
"kyc_tier": "tier_1",
"session_entropy": 0.282
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 397,
"timestamp": "2026-01-02T08:55:00Z",
"transaction_amount_usd": 119695.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.95,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 304287.94,
"financial_exposure_usd": 502879.61,
"recoverable_pct": 0.63
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101743",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "critical",
"timestamp": "2026-01-02T05:03:00Z",
"trace_id": "1f0f4e25-744a-da6f-cf5c-cc0db52e331f"
} | {
"account_age_days": 216,
"account_id": "ACCT-3CD60809E72C",
"baseline_risk_score": 0.453,
"kyc_tier": "tier_2",
"session_entropy": 0.572
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 159,
"timestamp": "2026-01-02T05:03:00Z",
"transaction_amount_usd": 105138.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.563,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 580042.92,
"financial_exposure_usd": 673650.18,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106573",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-05T13:33:00Z",
"trace_id": "b95a77c6-eeaf-5b90-16a0-566de7f4ffae"
} | {
"account_age_days": 329,
"account_id": "ACCT-8AF888E38269",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_1",
"session_entropy": 0.366
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 543,
"timestamp": "2026-01-05T13:33:00Z",
"transaction_amount_usd": 1763293.18
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.756,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4266703.46,
"financial_exposure_usd": 8614537.76,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106649",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-05T14:49:00Z",
"trace_id": "5eb79794-1d13-1419-50a0-e2c1bdfd04be"
} | {
"account_age_days": 1935,
"account_id": "ACCT-729C1054B288",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_3",
"session_entropy": 0.887
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 310,
"timestamp": "2026-01-05T07:36:00Z",
"transaction_amount_usd": 8.27
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.386,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3536236.71,
"financial_exposure_usd": 5919039.16,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106547",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "high",
"timestamp": "2026-01-05T13:07:00Z",
"trace_id": "6a74820b-d078-a453-4766-290a0bda6086"
} | {
"account_age_days": 49,
"account_id": "ACCT-8BCEFA7737C9",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_1",
"session_entropy": 0.475
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 686,
"timestamp": "2026-01-05T13:07:00Z",
"transaction_amount_usd": 939033.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.593,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1991085.43,
"financial_exposure_usd": 3983440.45,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109640",
"label": "benign",
"label_confidence": 0.651,
"severity": "medium",
"timestamp": "2026-01-07T16:40:00Z",
"trace_id": "85ef17c2-5261-de37-d6e5-a9b2ac4b36ed"
} | {
"account_age_days": 1936,
"account_id": "ACCT-EB5D60D71828",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.641
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1117,
"timestamp": "2026-01-07T16:40:00Z",
"transaction_amount_usd": 8199.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2205.89,
"financial_exposure_usd": 4981.9,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105200",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "low",
"timestamp": "2026-01-04T14:40:00Z",
"trace_id": "bef97591-af9a-243e-b2fb-9ae6cd22b7f4"
} | {
"account_age_days": 1048,
"account_id": "ACCT-C3AAFDE8507A",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_3",
"session_entropy": 0.283
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 827,
"timestamp": "2026-01-04T14:40:00Z",
"transaction_amount_usd": 1483102.59
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 679413.09,
"financial_exposure_usd": 1105501.39,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103626",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-03T12:26:00Z",
"trace_id": "bba05203-dde4-3216-50c7-275a26be77c8"
} | {
"account_age_days": 1890,
"account_id": "ACCT-5FC4EEF46CB5",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_3",
"session_entropy": 0.858
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 512,
"timestamp": "2026-01-03T12:26:00Z",
"transaction_amount_usd": 88518.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.904,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 770064.75,
"financial_exposure_usd": 1338293.57,
"recoverable_pct": 0.403
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104464",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "medium",
"timestamp": "2026-01-04T02:24:00Z",
"trace_id": "9512423c-e61d-ff85-fa10-1999ec31f000"
} | {
"account_age_days": 1097,
"account_id": "ACCT-8D524BB2EEA7",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.224
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1164,
"timestamp": "2026-01-04T02:24:00Z",
"transaction_amount_usd": 412044.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4000735.28,
"financial_exposure_usd": 6347538.52,
"recoverable_pct": 0.807
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105590",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "critical",
"timestamp": "2026-01-04T21:10:00Z",
"trace_id": "49f0334f-b031-56ea-8194-da8f705177c4"
} | {
"account_age_days": 1998,
"account_id": "ACCT-6659544A4C66",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_2",
"session_entropy": 0.47
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 107,
"timestamp": "2026-01-04T17:17:00Z",
"transaction_amount_usd": 16.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3504361.61,
"financial_exposure_usd": 5193194.84,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107848",
"label": "benign",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-06T10:48:00Z",
"trace_id": "3c3bee9e-3490-66e4-3ed8-597474b133d8"
} | {
"account_age_days": 628,
"account_id": "ACCT-D4BB21AD52D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.935
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 238,
"timestamp": "2026-01-06T10:48:00Z",
"transaction_amount_usd": 14620.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3550.35,
"financial_exposure_usd": 4409.91,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104267",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-03T23:07:00Z",
"trace_id": "d7b6fe9d-6d09-5747-59d4-fda1a8825986"
} | {
"account_age_days": 1747,
"account_id": "ACCT-4E793B50DD33",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_3",
"session_entropy": 0.107
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 951,
"timestamp": "2026-01-03T23:07:00Z",
"transaction_amount_usd": 1199408.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.946,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1813857.61,
"financial_exposure_usd": 3309131.27,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108503",
"label": "benign",
"label_confidence": 0.596,
"severity": "low",
"timestamp": "2026-01-06T21:43:00Z",
"trace_id": "75118d1e-cff3-fe1e-fb12-7bbafaa31493"
} | {
"account_age_days": 1519,
"account_id": "ACCT-6A76B33E2C4C",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_2",
"session_entropy": 0.282
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 361,
"timestamp": "2026-01-06T14:28:00Z",
"transaction_amount_usd": 9.01
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 844.05,
"financial_exposure_usd": 1171.36,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109219",
"label": "benign",
"label_confidence": 0.497,
"severity": "low",
"timestamp": "2026-01-07T09:39:00Z",
"trace_id": "03a577bc-f6db-7dc1-ed35-f9cb13188922"
} | {
"account_age_days": 1155,
"account_id": "ACCT-B1416B0DA847",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.785
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 789,
"timestamp": "2026-01-07T09:39:00Z",
"transaction_amount_usd": 7206.67
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.621,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3767,
"financial_exposure_usd": 6948.51,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104087",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "high",
"timestamp": "2026-01-03T20:07:00Z",
"trace_id": "151e733b-77c1-5e86-5b8d-fb3c86170b32"
} | {
"account_age_days": 1351,
"account_id": "ACCT-BA6021D33BAD",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_2",
"session_entropy": 0.73
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 255,
"timestamp": "2026-01-03T20:07:00Z",
"transaction_amount_usd": 2364110.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.563,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2342228.57,
"financial_exposure_usd": 3462062.26,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104098",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-03T20:18:00Z",
"trace_id": "171e7f4d-abf3-9542-fbce-409ff2599e31"
} | {
"account_age_days": 396,
"account_id": "ACCT-BB5D914AE900",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_2",
"session_entropy": 0.593
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 189,
"timestamp": "2026-01-03T20:18:00Z",
"transaction_amount_usd": 2881672.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3359519.13,
"financial_exposure_usd": 6104362.92,
"recoverable_pct": 0.417
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108355",
"label": "benign",
"label_confidence": 0.677,
"severity": "medium",
"timestamp": "2026-01-06T19:15:00Z",
"trace_id": "4f1c74d3-200f-720d-ce8c-197c1c64f4a5"
} | {
"account_age_days": 1452,
"account_id": "ACCT-69E1638E5041",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.303
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 875,
"timestamp": "2026-01-06T19:15:00Z",
"transaction_amount_usd": 7320.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.712,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5603.85,
"financial_exposure_usd": 9577.36,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101413",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "medium",
"timestamp": "2026-01-01T23:33:00Z",
"trace_id": "15c78617-adab-63fb-6381-8e61539b3995"
} | {
"account_age_days": 1199,
"account_id": "ACCT-E9A31B3A56E2",
"baseline_risk_score": 0.582,
"kyc_tier": "tier_3",
"session_entropy": 0.615
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 422,
"timestamp": "2026-01-01T23:33:00Z",
"transaction_amount_usd": 88752.59
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.911,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 202371.76,
"financial_exposure_usd": 301186.05,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107765",
"label": "benign",
"label_confidence": 0.653,
"severity": "low",
"timestamp": "2026-01-06T09:25:00Z",
"trace_id": "bc781bdf-ffd6-bbed-e9b1-6b2ca7ca6456"
} | {
"account_age_days": 62,
"account_id": "ACCT-DCA3BE3B99E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.697
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 201,
"timestamp": "2026-01-06T09:25:00Z",
"transaction_amount_usd": 2805.84
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 199.03,
"financial_exposure_usd": 381.51,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109060",
"label": "benign",
"label_confidence": 0.596,
"severity": "medium",
"timestamp": "2026-01-07T07:00:00Z",
"trace_id": "81be4135-c561-1af3-a2ea-01c03390cc29"
} | {
"account_age_days": 1296,
"account_id": "ACCT-40EEA12619E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.203
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1092,
"timestamp": "2026-01-07T07:00:00Z",
"transaction_amount_usd": 1618.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1022.44,
"financial_exposure_usd": 2197.64,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104868",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "critical",
"timestamp": "2026-01-04T09:08:00Z",
"trace_id": "3e6d4ca7-e25e-6609-7cea-90c48759d931"
} | {
"account_age_days": 120,
"account_id": "ACCT-6A5A07AF2353",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.638
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 982,
"timestamp": "2026-01-04T09:08:00Z",
"transaction_amount_usd": 552397.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.438,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2743962.75,
"financial_exposure_usd": 3384728.06,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107347",
"label": "benign",
"label_confidence": 0.659,
"severity": "low",
"timestamp": "2026-01-06T02:27:00Z",
"trace_id": "1bf2a9bc-254f-f0e0-b67e-7516af7bca62"
} | {
"account_age_days": 1709,
"account_id": "ACCT-E2A980C5565C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.566
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 812,
"timestamp": "2026-01-06T02:27:00Z",
"transaction_amount_usd": 4417.48
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.502,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3732.06,
"financial_exposure_usd": 4640.91,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101602",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "high",
"timestamp": "2026-01-02T02:42:00Z",
"trace_id": "71b22f24-7c27-3ffd-88db-3597692c25e3"
} | {
"account_age_days": 1628,
"account_id": "ACCT-0FA0479335C3",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 610,
"timestamp": "2026-01-02T02:42:00Z",
"transaction_amount_usd": 66039.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.852,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 359183.39,
"financial_exposure_usd": 487887.02,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106040",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "critical",
"timestamp": "2026-01-05T04:40:00Z",
"trace_id": "42b45f22-8eea-7a72-cd85-0a177ec6b64c"
} | {
"account_age_days": 806,
"account_id": "ACCT-D0AD3BE4A41D",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 271,
"timestamp": "2026-01-04T20:02:00Z",
"transaction_amount_usd": 14.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.566,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1661469.59,
"financial_exposure_usd": 2327037.02,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100260",
"label": "fraudulent",
"label_confidence": 0.952,
"severity": "critical",
"timestamp": "2026-01-01T04:20:00Z",
"trace_id": "aabd4589-b736-5e1b-36f1-374dee426792"
} | {
"account_age_days": 1777,
"account_id": "ACCT-38CA4DA701F0",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_2",
"session_entropy": 0.696
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 279,
"timestamp": "2026-01-01T04:20:00Z",
"transaction_amount_usd": 15820.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING ... | {
"customer_funds_at_risk_usd": 225719.5,
"financial_exposure_usd": 550379.54,
"recoverable_pct": 0.309
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109294",
"label": "benign",
"label_confidence": 0.631,
"severity": "medium",
"timestamp": "2026-01-07T10:54:00Z",
"trace_id": "8df267c1-494a-f9b3-ec02-eed69443d2b4"
} | {
"account_age_days": 453,
"account_id": "ACCT-E20DB4C066D0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.487
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 327,
"timestamp": "2026-01-06T23:40:00Z",
"transaction_amount_usd": 11.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1011.28,
"financial_exposure_usd": 1615.88,
"recoverable_pct": 0.789
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104936",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "medium",
"timestamp": "2026-01-04T10:16:00Z",
"trace_id": "cfff94f0-b573-f991-fe76-85d4c3b7ab2b"
} | {
"account_age_days": 599,
"account_id": "ACCT-0AA73A6FDA92",
"baseline_risk_score": 0.38,
"kyc_tier": "tier_1",
"session_entropy": 0.358
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 378,
"timestamp": "2026-01-04T09:00:00Z",
"transaction_amount_usd": 1.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.785,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2622872.22,
"financial_exposure_usd": 6546756,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103130",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "critical",
"timestamp": "2026-01-03T04:10:00Z",
"trace_id": "04f9fb0d-783d-18e5-05ff-9a77c3ca7c8c"
} | {
"account_age_days": 1723,
"account_id": "ACCT-1316AC01E57F",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_1",
"session_entropy": 0.246
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 609,
"timestamp": "2026-01-03T04:10:00Z",
"transaction_amount_usd": 90926.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 471263.41,
"financial_exposure_usd": 1003049.25,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104861",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "critical",
"timestamp": "2026-01-04T09:01:00Z",
"trace_id": "a6a8b8b5-5884-b72e-97b3-a82acb00d397"
} | {
"account_age_days": 929,
"account_id": "ACCT-D43380E84DB6",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_3",
"session_entropy": 0.731
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 139,
"timestamp": "2026-01-03T20:09:00Z",
"transaction_amount_usd": 4.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3624998.21,
"financial_exposure_usd": 6466044.99,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108329",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-06T18:49:00Z",
"trace_id": "f606a863-1a79-8779-7aa7-46103a0c5e50"
} | {
"account_age_days": 676,
"account_id": "ACCT-81407D44168A",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_1",
"session_entropy": 0.812
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 470,
"timestamp": "2026-01-06T18:49:00Z",
"transaction_amount_usd": 489.6
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5145.22,
"financial_exposure_usd": 6679.94,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108132",
"label": "benign",
"label_confidence": 0.711,
"severity": "medium",
"timestamp": "2026-01-06T15:32:00Z",
"trace_id": "655027d7-840e-c19e-5be2-caa41aeb41c1"
} | {
"account_age_days": 923,
"account_id": "ACCT-83140BD0D503",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.935
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 252,
"timestamp": "2026-01-06T15:32:00Z",
"transaction_amount_usd": 12325.77
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.666,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2145.2,
"financial_exposure_usd": 3982.49,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106471",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-05T11:51:00Z",
"trace_id": "2b3f4cbc-1ef4-4111-1177-d64b5c0e9294"
} | {
"account_age_days": 934,
"account_id": "ACCT-48DBA09D3C6E",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_2",
"session_entropy": 0.133
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 804,
"timestamp": "2026-01-05T11:51:00Z",
"transaction_amount_usd": 1173988.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.414,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2524466.88,
"financial_exposure_usd": 2690223.91,
"recoverable_pct": 1
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100089",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "critical",
"timestamp": "2026-01-01T01:29:00Z",
"trace_id": "13620119-efa9-a0a3-a915-1364778a669f"
} | {
"account_age_days": 1678,
"account_id": "ACCT-62699A4400D8",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_2",
"session_entropy": 0.911
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 231,
"timestamp": "2026-01-01T01:29:00Z",
"transaction_amount_usd": 119432.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.69,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 20272.69,
"financial_exposure_usd": 33784.23,
"recoverable_pct": 0.257
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100017",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "critical",
"timestamp": "2026-01-01T00:17:00Z",
"trace_id": "3ce915e7-c9d6-a63b-ca3c-6f5f5bb5c40c"
} | {
"account_age_days": 854,
"account_id": "ACCT-D3D1BF0F56C4",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_3",
"session_entropy": 0.485
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 312,
"timestamp": "2026-01-01T00:17:00Z",
"transaction_amount_usd": 21322.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.538,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 646603.85,
"financial_exposure_usd": 809200.85,
"recoverable_pct": 0.318
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102637",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "critical",
"timestamp": "2026-01-02T19:57:00Z",
"trace_id": "3928959d-862c-5160-d91f-b22835f91835"
} | {
"account_age_days": 770,
"account_id": "ACCT-4AE83ECC33A0",
"baseline_risk_score": 0.542,
"kyc_tier": "tier_1",
"session_entropy": 0.619
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 937,
"timestamp": "2026-01-02T19:57:00Z",
"transaction_amount_usd": 115823.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 814153.12,
"financial_exposure_usd": 1114151.02,
"recoverable_pct": 0.216
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109246",
"label": "benign",
"label_confidence": 0.456,
"severity": "low",
"timestamp": "2026-01-07T10:06:00Z",
"trace_id": "ea6c4330-43b3-23e6-646e-c3c1ba3776f9"
} | {
"account_age_days": 1785,
"account_id": "ACCT-91A15F2C1353",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_1",
"session_entropy": 0.465
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 988,
"timestamp": "2026-01-07T10:06:00Z",
"transaction_amount_usd": 12364.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.507,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 911.79,
"financial_exposure_usd": 1893.07,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.