schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108929",
"label": "benign",
"label_confidence": 0.703,
"severity": "low",
"timestamp": "2026-01-07T04:49:00Z",
"trace_id": "70022acc-f6df-79bb-550d-b15239509437"
} | {
"account_age_days": 1465,
"account_id": "ACCT-0DD732EF0542",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_1",
"session_entropy": 0.479
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 136,
"timestamp": "2026-01-07T04:49:00Z",
"transaction_amount_usd": 5662.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.739,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1325.43,
"financial_exposure_usd": 2063.76,
"recoverable_pct": 0.704
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108635",
"label": "benign",
"label_confidence": 0.602,
"severity": "medium",
"timestamp": "2026-01-06T23:55:00Z",
"trace_id": "1463cdf8-6d31-cdd4-561a-84ce053489e6"
} | {
"account_age_days": 1879,
"account_id": "ACCT-E9B4459A44B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.292
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 824,
"timestamp": "2026-01-06T23:55:00Z",
"transaction_amount_usd": 11540.67
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 557.02,
"financial_exposure_usd": 1293.3,
"recoverable_pct": 0.796
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109743",
"label": "benign",
"label_confidence": 0.637,
"severity": "low",
"timestamp": "2026-01-07T18:23:00Z",
"trace_id": "05593d48-12d1-97ed-702a-fd9398c860b2"
} | {
"account_age_days": 174,
"account_id": "ACCT-5A984C46649E",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_3",
"session_entropy": 0.785
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 687,
"timestamp": "2026-01-07T18:23:00Z",
"transaction_amount_usd": 3815.28
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.558,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4068.67,
"financial_exposure_usd": 8949.49,
"recoverable_pct": 0.983
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103314",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "high",
"timestamp": "2026-01-03T07:14:00Z",
"trace_id": "90e6e8e7-8be7-a546-c0b3-20e1a664a3c8"
} | {
"account_age_days": 1111,
"account_id": "ACCT-63EDDD1283FF",
"baseline_risk_score": 0.536,
"kyc_tier": "tier_1",
"session_entropy": 0.291
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 901,
"timestamp": "2026-01-03T07:14:00Z",
"transaction_amount_usd": 77915.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.678,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 705137.65,
"financial_exposure_usd": 706599.8,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104265",
"label": "fraudulent",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-03T23:05:00Z",
"trace_id": "ffa9e6a8-3b07-4788-1233-38d281fd9d6c"
} | {
"account_age_days": 25,
"account_id": "ACCT-98E982B49DB6",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_2",
"session_entropy": 0.112
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 83,
"timestamp": "2026-01-03T23:05:00Z",
"transaction_amount_usd": 1679032.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.438,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4665425.2,
"financial_exposure_usd": 5911587.49,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109684",
"label": "benign",
"label_confidence": 0.584,
"severity": "medium",
"timestamp": "2026-01-07T17:24:00Z",
"trace_id": "6de62fb6-c9dd-9a34-0baf-c2ad152bc73a"
} | {
"account_age_days": 1481,
"account_id": "ACCT-BC7F517DCF76",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.278
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 218,
"timestamp": "2026-01-07T17:24:00Z",
"transaction_amount_usd": 840.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 551.05,
"financial_exposure_usd": 598.36,
"recoverable_pct": 0.858
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107691",
"label": "benign",
"label_confidence": 0.745,
"severity": "high",
"timestamp": "2026-01-06T08:11:00Z",
"trace_id": "6d8f892c-0340-b90d-c77a-8bc18b7b3584"
} | {
"account_age_days": 1947,
"account_id": "ACCT-E4DCEF659C22",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.453
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 838,
"timestamp": "2026-01-06T08:11:00Z",
"transaction_amount_usd": 3992.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2532.06,
"financial_exposure_usd": 3126.8,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103411",
"label": "fraudulent",
"label_confidence": 0.696,
"severity": "high",
"timestamp": "2026-01-03T08:51:00Z",
"trace_id": "af8c63a0-c542-eeb8-4a49-a59ce33d2758"
} | {
"account_age_days": 612,
"account_id": "ACCT-FAB412911D47",
"baseline_risk_score": 0.235,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 832,
"timestamp": "2026-01-03T08:51:00Z",
"transaction_amount_usd": 2022521.75
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.409,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3995752.12,
"financial_exposure_usd": 5711213.57,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106339",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "critical",
"timestamp": "2026-01-05T09:39:00Z",
"trace_id": "6c12874e-c1bc-84c9-7e6c-1f7ab566ad0a"
} | {
"account_age_days": 141,
"account_id": "ACCT-B9B3F295FFA4",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_2",
"session_entropy": 0.579
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 668,
"timestamp": "2026-01-05T09:39:00Z",
"transaction_amount_usd": 578574.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.455,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3747482.85,
"financial_exposure_usd": 5454333.41,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102357",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-02T15:17:00Z",
"trace_id": "aac3de9a-703a-9a78-f2ca-681ad693a963"
} | {
"account_age_days": 828,
"account_id": "ACCT-C9EC964F996E",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_2",
"session_entropy": 0.891
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 462,
"timestamp": "2026-01-02T15:17:00Z",
"transaction_amount_usd": 34927.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.693,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1039692.59,
"financial_exposure_usd": 1414858.37,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105952",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-05T03:12:00Z",
"trace_id": "6cbdf710-9ad5-78fd-b158-f8d5a730e49b"
} | {
"account_age_days": 120,
"account_id": "ACCT-7E219C40DB69",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_2",
"session_entropy": 0.866
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 601,
"timestamp": "2026-01-05T03:12:00Z",
"transaction_amount_usd": 406464.03
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4435415.91,
"financial_exposure_usd": 6937463.39,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102226",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "critical",
"timestamp": "2026-01-02T13:06:00Z",
"trace_id": "185bb945-612d-f3ad-308c-8ae1a0b919bf"
} | {
"account_age_days": 1309,
"account_id": "ACCT-71A8B4EC9348",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_3",
"session_entropy": 0.444
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 398,
"timestamp": "2026-01-02T10:12:00Z",
"transaction_amount_usd": 22.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.419,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 381570.98,
"financial_exposure_usd": 723050.12,
"recoverable_pct": 0.265
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100428",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "low",
"timestamp": "2026-01-01T07:08:00Z",
"trace_id": "1d4f642c-ff80-23e9-a979-12a9d0794a04"
} | {
"account_age_days": 695,
"account_id": "ACCT-159F3CF1D9ED",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.508
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 284,
"timestamp": "2026-01-01T07:08:00Z",
"transaction_amount_usd": 6843.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.694,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 401813.57,
"financial_exposure_usd": 849014.35,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101250",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "critical",
"timestamp": "2026-01-01T20:50:00Z",
"trace_id": "39db45b9-01cd-2a0e-f7ff-b4036849ab2c"
} | {
"account_age_days": 1794,
"account_id": "ACCT-5A82B7C5AA61",
"baseline_risk_score": 0.569,
"kyc_tier": "tier_1",
"session_entropy": 0.175
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 850,
"timestamp": "2026-01-01T20:50:00Z",
"transaction_amount_usd": 15133.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.609,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 233210.19,
"financial_exposure_usd": 511980.17,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109797",
"label": "benign",
"label_confidence": 0.599,
"severity": "critical",
"timestamp": "2026-01-07T19:17:00Z",
"trace_id": "d82cafcc-6ec3-674b-2a96-84aed0a3b8ec"
} | {
"account_age_days": 1376,
"account_id": "ACCT-C1487FFA5ABC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.745
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 727,
"timestamp": "2026-01-07T19:17:00Z",
"transaction_amount_usd": 12025.16
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.518,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 763.26,
"financial_exposure_usd": 1067.93,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101423",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-01T23:43:00Z",
"trace_id": "2ea7609e-41c0-a692-e3d8-4592d7898c32"
} | {
"account_age_days": 1162,
"account_id": "ACCT-229CEAA1B7AF",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_2",
"session_entropy": 0.648
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 187,
"timestamp": "2026-01-01T19:43:00Z",
"transaction_amount_usd": 4.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.65,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 417550.4,
"financial_exposure_usd": 755992.95,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108086",
"label": "benign",
"label_confidence": 0.517,
"severity": "low",
"timestamp": "2026-01-06T14:46:00Z",
"trace_id": "5e439b79-dc08-e735-48c2-7397d84aec74"
} | {
"account_age_days": 95,
"account_id": "ACCT-FE7F7F55C13A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.444
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 389,
"timestamp": "2026-01-06T14:46:00Z",
"transaction_amount_usd": 818.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1022.73,
"financial_exposure_usd": 2105.49,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104372",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "low",
"timestamp": "2026-01-04T00:52:00Z",
"trace_id": "ecc4c57f-c037-781d-3ce6-4db73cd838fa"
} | {
"account_age_days": 828,
"account_id": "ACCT-FA3CFE36134F",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_3",
"session_entropy": 0.572
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1048,
"timestamp": "2026-01-04T00:52:00Z",
"transaction_amount_usd": 2891684.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.682,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4225670.55,
"financial_exposure_usd": 5543328.59,
"recoverable_pct": 0.589
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106444",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "medium",
"timestamp": "2026-01-05T11:24:00Z",
"trace_id": "ecadf3a1-9156-0915-3245-9ab79009d15a"
} | {
"account_age_days": 543,
"account_id": "ACCT-A1CEDE4583D4",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.161
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 668,
"timestamp": "2026-01-05T11:24:00Z",
"transaction_amount_usd": 741001.79
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.822,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2120036.63,
"financial_exposure_usd": 2816156.56,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106047",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "medium",
"timestamp": "2026-01-05T04:47:00Z",
"trace_id": "4d3ee24c-e1b6-81c5-eaf8-e38e1eab118e"
} | {
"account_age_days": 1347,
"account_id": "ACCT-450A63E94FDE",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_2",
"session_entropy": 0.62
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1157,
"timestamp": "2026-01-05T04:47:00Z",
"transaction_amount_usd": 1229971.79
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.544,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3544419.22,
"financial_exposure_usd": 3857081.54,
"recoverable_pct": 0.647
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104958",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "critical",
"timestamp": "2026-01-04T10:38:00Z",
"trace_id": "f2c8e154-9ebe-82a8-f598-39c10a5df7e5"
} | {
"account_age_days": 9,
"account_id": "ACCT-B97EF91C2830",
"baseline_risk_score": 0.068,
"kyc_tier": "tier_2",
"session_entropy": 0.719
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 347,
"timestamp": "2026-01-04T10:38:00Z",
"transaction_amount_usd": 1502213.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3169752.61,
"financial_exposure_usd": 6766044.87,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106133",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "medium",
"timestamp": "2026-01-05T06:13:00Z",
"trace_id": "fc77cd4a-43fa-0569-7da0-61592fd19dce"
} | {
"account_age_days": 1223,
"account_id": "ACCT-9374BAD841FF",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_3",
"session_entropy": 0.809
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 935,
"timestamp": "2026-01-05T06:13:00Z",
"transaction_amount_usd": 203973.46
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.694,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2864246.02,
"financial_exposure_usd": 5673400.64,
"recoverable_pct": 0.49
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101961",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "high",
"timestamp": "2026-01-02T08:41:00Z",
"trace_id": "2f1f767e-2b04-c911-27a1-428994a3a0a2"
} | {
"account_age_days": 97,
"account_id": "ACCT-6395891CA629",
"baseline_risk_score": 0.619,
"kyc_tier": "tier_2",
"session_entropy": 0.227
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 364,
"timestamp": "2026-01-02T08:41:00Z",
"transaction_amount_usd": 95714.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 460437.29,
"financial_exposure_usd": 551835.55,
"recoverable_pct": 0.635
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100564",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-01T09:24:00Z",
"trace_id": "9af14895-37ea-40b6-962d-639f5e74efd0"
} | {
"account_age_days": 1643,
"account_id": "ACCT-3D8B086A5F9D",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_2",
"session_entropy": 0.386
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 550,
"timestamp": "2026-01-01T09:24:00Z",
"transaction_amount_usd": 64490.51
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.632,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 876502.07,
"financial_exposure_usd": 1021241.68,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104957",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "high",
"timestamp": "2026-01-04T10:37:00Z",
"trace_id": "96c9dd12-366a-08ed-28c9-068236c56055"
} | {
"account_age_days": 1457,
"account_id": "ACCT-5B2F26F2DA07",
"baseline_risk_score": 0.434,
"kyc_tier": "tier_1",
"session_entropy": 0.667
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 243,
"timestamp": "2026-01-04T10:37:00Z",
"transaction_amount_usd": 751171.42
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.703,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3933013.61,
"financial_exposure_usd": 4944287.55,
"recoverable_pct": 0.907
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108720",
"label": "benign",
"label_confidence": 0.536,
"severity": "medium",
"timestamp": "2026-01-07T01:20:00Z",
"trace_id": "e1e136f2-e446-cb08-c197-6f4285f58def"
} | {
"account_age_days": 1990,
"account_id": "ACCT-0973549A10EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.831
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 373,
"timestamp": "2026-01-06T22:54:00Z",
"transaction_amount_usd": 24.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2509.71,
"financial_exposure_usd": 4598.23,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101507",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "medium",
"timestamp": "2026-01-02T01:07:00Z",
"trace_id": "7555e394-05f3-fba7-35dc-6b20264f61fe"
} | {
"account_age_days": 621,
"account_id": "ACCT-3F040E380EF6",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_3",
"session_entropy": 0.552
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 798,
"timestamp": "2026-01-02T01:07:00Z",
"transaction_amount_usd": 78926.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.41,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 528365.26,
"financial_exposure_usd": 912496.36,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100119",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "critical",
"timestamp": "2026-01-01T01:59:00Z",
"trace_id": "db00ab4c-91e5-2e86-eefe-02c34276bfe1"
} | {
"account_age_days": 1067,
"account_id": "ACCT-0DEF4FD0D51F",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_1",
"session_entropy": 0.798
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1171,
"timestamp": "2026-01-01T01:59:00Z",
"transaction_amount_usd": 87603.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 632188.24,
"financial_exposure_usd": 736422.05,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109331",
"label": "benign",
"label_confidence": 0.516,
"severity": "high",
"timestamp": "2026-01-07T11:31:00Z",
"trace_id": "fbdea6a5-3663-f8e0-b434-8c1c853c7459"
} | {
"account_age_days": 727,
"account_id": "ACCT-DF859D85044A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.451
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 679,
"timestamp": "2026-01-07T11:31:00Z",
"transaction_amount_usd": 12720.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1430.07,
"financial_exposure_usd": 1487.12,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108808",
"label": "benign",
"label_confidence": 0.636,
"severity": "high",
"timestamp": "2026-01-07T02:48:00Z",
"trace_id": "7eacc1c8-c32a-22f6-b79a-5126b63bd4e5"
} | {
"account_age_days": 1515,
"account_id": "ACCT-019246EC289B",
"baseline_risk_score": 0.106,
"kyc_tier": "tier_1",
"session_entropy": 0.351
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 320,
"timestamp": "2026-01-06T15:47:00Z",
"transaction_amount_usd": 16.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4728.78,
"financial_exposure_usd": 7293.87,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108793",
"label": "benign",
"label_confidence": 0.593,
"severity": "low",
"timestamp": "2026-01-07T02:33:00Z",
"trace_id": "d7ae32a6-6e4f-50db-372a-689d495d0026"
} | {
"account_age_days": 1275,
"account_id": "ACCT-926199202321",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_3",
"session_entropy": 0.3
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 314,
"timestamp": "2026-01-06T21:37:00Z",
"transaction_amount_usd": 7.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1415.58,
"financial_exposure_usd": 2688.71,
"recoverable_pct": 0.54
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104081",
"label": "fraudulent",
"label_confidence": 0.708,
"severity": "medium",
"timestamp": "2026-01-03T20:01:00Z",
"trace_id": "150c1a78-de69-9104-64a9-de10cc202c3a"
} | {
"account_age_days": 376,
"account_id": "ACCT-25C621A0FB5F",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_1",
"session_entropy": 0.79
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1178,
"timestamp": "2026-01-03T20:01:00Z",
"transaction_amount_usd": 2991785.53
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.567,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4672224.54,
"financial_exposure_usd": 4984085.41,
"recoverable_pct": 0.969
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108901",
"label": "benign",
"label_confidence": 0.5,
"severity": "low",
"timestamp": "2026-01-07T04:21:00Z",
"trace_id": "4020e8a0-f186-2050-072d-3acfa163407c"
} | {
"account_age_days": 936,
"account_id": "ACCT-AB0E3EE96403",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.72
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 341,
"timestamp": "2026-01-07T04:21:00Z",
"transaction_amount_usd": 9132.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.585,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1681.89,
"financial_exposure_usd": 3049.59,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107781",
"label": "benign",
"label_confidence": 0.587,
"severity": "medium",
"timestamp": "2026-01-06T09:41:00Z",
"trace_id": "c4460548-96e2-ab26-0479-eea582e67681"
} | {
"account_age_days": 1129,
"account_id": "ACCT-D1431A7CF619",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.258
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 95,
"timestamp": "2026-01-06T01:51:00Z",
"transaction_amount_usd": 2.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.782,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2518.21,
"financial_exposure_usd": 4176.6,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109815",
"label": "benign",
"label_confidence": 0.684,
"severity": "low",
"timestamp": "2026-01-07T19:35:00Z",
"trace_id": "5238dc18-824d-899d-0c10-670586d4180c"
} | {
"account_age_days": 735,
"account_id": "ACCT-3D07C85B4A07",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.752
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 278,
"timestamp": "2026-01-07T19:35:00Z",
"transaction_amount_usd": 9030.81
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1584.32,
"financial_exposure_usd": 2080.54,
"recoverable_pct": 0.924
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108379",
"label": "benign",
"label_confidence": 0.676,
"severity": "high",
"timestamp": "2026-01-06T19:39:00Z",
"trace_id": "a866918c-2620-32f1-373d-436402ec2bfa"
} | {
"account_age_days": 351,
"account_id": "ACCT-749A1B309572",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_3",
"session_entropy": 0.331
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 935,
"timestamp": "2026-01-06T19:39:00Z",
"transaction_amount_usd": 10014.68
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1529.24,
"financial_exposure_usd": 1864.4,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104518",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-04T03:18:00Z",
"trace_id": "61a597d3-266b-4955-1121-b979aee15a25"
} | {
"account_age_days": 1301,
"account_id": "ACCT-BB084838A9A7",
"baseline_risk_score": 0.432,
"kyc_tier": "tier_2",
"session_entropy": 0.301
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 681,
"timestamp": "2026-01-04T03:18:00Z",
"transaction_amount_usd": 1878436.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.931,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5082586.48,
"financial_exposure_usd": 5761599.2,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105252",
"label": "fraudulent",
"label_confidence": 0.663,
"severity": "medium",
"timestamp": "2026-01-04T15:32:00Z",
"trace_id": "10a22069-9183-5800-a5f5-5cc34651d2a3"
} | {
"account_age_days": 1912,
"account_id": "ACCT-2B8E750D20B2",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_1",
"session_entropy": 0.546
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 500,
"timestamp": "2026-01-04T15:32:00Z",
"transaction_amount_usd": 55393.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.774,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7945543.48,
"financial_exposure_usd": 8193841.66,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106753",
"label": "benign",
"label_confidence": 0.743,
"severity": "low",
"timestamp": "2026-01-05T16:33:00Z",
"trace_id": "e0dcd2b5-d9fc-cc71-ed9d-2ab5e3bd9447"
} | {
"account_age_days": 10,
"account_id": "ACCT-1BB752ACB2BD",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 466,
"timestamp": "2026-01-05T16:33:00Z",
"transaction_amount_usd": 4668.11
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.518,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 567.95,
"financial_exposure_usd": 985.28,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109773",
"label": "benign",
"label_confidence": 0.647,
"severity": "low",
"timestamp": "2026-01-07T18:53:00Z",
"trace_id": "d361ff3d-1da8-2ad4-0633-e994bfa32a28"
} | {
"account_age_days": 1334,
"account_id": "ACCT-9DE089F4FDDB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.215
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 863,
"timestamp": "2026-01-07T18:53:00Z",
"transaction_amount_usd": 13371.76
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.664,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2362.35,
"financial_exposure_usd": 3792.94,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105572",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "critical",
"timestamp": "2026-01-04T20:52:00Z",
"trace_id": "62401ae1-69d4-5b94-910b-74949dc2f80e"
} | {
"account_age_days": 1037,
"account_id": "ACCT-10F4A5298C63",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_3",
"session_entropy": 0.413
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1166,
"timestamp": "2026-01-04T20:52:00Z",
"transaction_amount_usd": 1551008.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.794,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 671719.88,
"financial_exposure_usd": 1661485.42,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105831",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "high",
"timestamp": "2026-01-05T01:11:00Z",
"trace_id": "1d8819cc-de9a-d313-b611-cce0ff4ba829"
} | {
"account_age_days": 932,
"account_id": "ACCT-3107C38F3217",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_1",
"session_entropy": 0.821
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 348,
"timestamp": "2026-01-04T22:38:00Z",
"transaction_amount_usd": 14.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.676,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3744187.31,
"financial_exposure_usd": 4993861.75,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105506",
"label": "fraudulent",
"label_confidence": 0.677,
"severity": "low",
"timestamp": "2026-01-04T19:46:00Z",
"trace_id": "504dfaa6-ab6e-6d38-51a5-6f982aae5422"
} | {
"account_age_days": 568,
"account_id": "ACCT-038C499F38E8",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.132
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 83,
"timestamp": "2026-01-04T16:47:00Z",
"transaction_amount_usd": 0.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.507,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1369901.04,
"financial_exposure_usd": 2210320.89,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108306",
"label": "benign",
"label_confidence": 0.727,
"severity": "medium",
"timestamp": "2026-01-06T18:26:00Z",
"trace_id": "9060c4ec-c2bf-207b-0789-07b5dfb06288"
} | {
"account_age_days": 1838,
"account_id": "ACCT-0E5ABC191C53",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.54
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 262,
"timestamp": "2026-01-06T18:26:00Z",
"transaction_amount_usd": 5582.85
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.504,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2050.25,
"financial_exposure_usd": 3088.71,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102540",
"label": "fraudulent",
"label_confidence": 0.805,
"severity": "critical",
"timestamp": "2026-01-02T18:20:00Z",
"trace_id": "0c9560af-5959-e184-2ac5-76602526292e"
} | {
"account_age_days": 12,
"account_id": "ACCT-E9CBDD5E2CB5",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.712
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1034,
"timestamp": "2026-01-02T18:20:00Z",
"transaction_amount_usd": 568.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.941,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 472004.47,
"financial_exposure_usd": 1002550.02,
"recoverable_pct": 0.253
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107205",
"label": "benign",
"label_confidence": 0.554,
"severity": "high",
"timestamp": "2026-01-06T00:05:00Z",
"trace_id": "f6cf0efa-9397-fb31-9d7a-2a7c85fdc4e5"
} | {
"account_age_days": 1702,
"account_id": "ACCT-6D9D4F925612",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_3",
"session_entropy": 0.246
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 220,
"timestamp": "2026-01-05T11:50:00Z",
"transaction_amount_usd": 11.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2793.83,
"financial_exposure_usd": 5020.05,
"recoverable_pct": 0.673
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109189",
"label": "benign",
"label_confidence": 0.549,
"severity": "low",
"timestamp": "2026-01-07T09:09:00Z",
"trace_id": "3451f0f6-26ed-bb44-ea87-6769dd13f8e4"
} | {
"account_age_days": 1634,
"account_id": "ACCT-C9B3507E1F1B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.856
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 407,
"timestamp": "2026-01-07T09:09:00Z",
"transaction_amount_usd": 7370.2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 740.15,
"financial_exposure_usd": 828.21,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106071",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "high",
"timestamp": "2026-01-05T05:11:00Z",
"trace_id": "54a38ce1-ff16-b7b7-8ad0-3563414e0adb"
} | {
"account_age_days": 1912,
"account_id": "ACCT-967B14B00BC0",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_3",
"session_entropy": 0.876
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 196,
"timestamp": "2026-01-05T05:11:00Z",
"transaction_amount_usd": 2244429.79
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.734,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4824516.33,
"financial_exposure_usd": 5736581.38,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103337",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "medium",
"timestamp": "2026-01-03T07:37:00Z",
"trace_id": "90e559a2-595b-6ceb-5132-13f18ba29d89"
} | {
"account_age_days": 1685,
"account_id": "ACCT-8269CF4FEE03",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.447
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 683,
"timestamp": "2026-01-03T07:37:00Z",
"transaction_amount_usd": 2832155.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3728132.25,
"financial_exposure_usd": 5900528.37,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104292",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "high",
"timestamp": "2026-01-03T23:32:00Z",
"trace_id": "120332c4-44b0-a44f-899c-afe470b2c079"
} | {
"account_age_days": 782,
"account_id": "ACCT-603928E75062",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_2",
"session_entropy": 0.236
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 998,
"timestamp": "2026-01-03T23:32:00Z",
"transaction_amount_usd": 1694532.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2136279.11,
"financial_exposure_usd": 2585846.24,
"recoverable_pct": 0.856
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106996",
"label": "benign",
"label_confidence": 0.53,
"severity": "high",
"timestamp": "2026-01-05T20:36:00Z",
"trace_id": "819f87b2-7c1f-1843-65cd-273bf84152b1"
} | {
"account_age_days": 1645,
"account_id": "ACCT-8613AAA7F50C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 695,
"timestamp": "2026-01-05T20:36:00Z",
"transaction_amount_usd": 13783.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.508,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 323.1,
"financial_exposure_usd": 701.31,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108725",
"label": "benign",
"label_confidence": 0.707,
"severity": "medium",
"timestamp": "2026-01-07T01:25:00Z",
"trace_id": "9bc58d3b-a376-fc42-fd9a-32cd66a398e7"
} | {
"account_age_days": 878,
"account_id": "ACCT-58047374588F",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.127
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 164,
"timestamp": "2026-01-06T15:08:00Z",
"transaction_amount_usd": 1.17
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.53,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1159.61,
"financial_exposure_usd": 2360.06,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106502",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "critical",
"timestamp": "2026-01-05T12:22:00Z",
"trace_id": "567f3340-338d-8fdd-5e10-dc99556b37aa"
} | {
"account_age_days": 776,
"account_id": "ACCT-A9FE09BEF98E",
"baseline_risk_score": 0.122,
"kyc_tier": "tier_1",
"session_entropy": 0.748
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 325,
"timestamp": "2026-01-05T06:44:00Z",
"transaction_amount_usd": 11.86
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5507898.82,
"financial_exposure_usd": 7438758.19,
"recoverable_pct": 0.637
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107679",
"label": "benign",
"label_confidence": 0.56,
"severity": "medium",
"timestamp": "2026-01-06T07:59:00Z",
"trace_id": "2e25c062-2328-8dce-ca7e-83357eeb4e6b"
} | {
"account_age_days": 1677,
"account_id": "ACCT-9DEC99ED073A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.905
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 317,
"timestamp": "2026-01-06T05:58:00Z",
"transaction_amount_usd": 8.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2430.44,
"financial_exposure_usd": 2930.95,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108290",
"label": "benign",
"label_confidence": 0.501,
"severity": "medium",
"timestamp": "2026-01-06T18:10:00Z",
"trace_id": "49e300f6-c43a-2b1a-b143-4fd339436a42"
} | {
"account_age_days": 1586,
"account_id": "ACCT-37FA7821C736",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 866,
"timestamp": "2026-01-06T18:10:00Z",
"transaction_amount_usd": 8145.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5519.01,
"financial_exposure_usd": 7258.85,
"recoverable_pct": 0.794
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100478",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "high",
"timestamp": "2026-01-01T07:58:00Z",
"trace_id": "60036a54-e0a0-9aee-32c0-11f1dc186c23"
} | {
"account_age_days": 1089,
"account_id": "ACCT-35292A32CD8C",
"baseline_risk_score": 0.541,
"kyc_tier": "tier_1",
"session_entropy": 0.432
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 254,
"timestamp": "2026-01-01T05:56:00Z",
"transaction_amount_usd": 0.55
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.571,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 241441.36,
"financial_exposure_usd": 250099.65,
"recoverable_pct": 0.276
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102174",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "critical",
"timestamp": "2026-01-02T12:14:00Z",
"trace_id": "3c9551fa-cdf3-5212-0bfe-d901566c44f8"
} | {
"account_age_days": 1402,
"account_id": "ACCT-44EB26CD1F44",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.329
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 511,
"timestamp": "2026-01-02T12:14:00Z",
"transaction_amount_usd": 84741.9
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.783,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 412522.96,
"financial_exposure_usd": 614816.27,
"recoverable_pct": 0.301
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102993",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "low",
"timestamp": "2026-01-03T01:53:00Z",
"trace_id": "c2ea54b2-e716-b3d0-6536-010d6b607d97"
} | {
"account_age_days": 179,
"account_id": "ACCT-539093E63B21",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_1",
"session_entropy": 0.674
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 723,
"timestamp": "2026-01-03T01:53:00Z",
"transaction_amount_usd": 39335.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.436,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 367818.96,
"financial_exposure_usd": 578248.9,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103485",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "low",
"timestamp": "2026-01-03T10:05:00Z",
"trace_id": "99517980-1707-d0fe-9429-13df884bf4c8"
} | {
"account_age_days": 238,
"account_id": "ACCT-15E63951B2DA",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_2",
"session_entropy": 0.372
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 234,
"timestamp": "2026-01-03T07:50:00Z",
"transaction_amount_usd": 18.27
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2942675.51,
"financial_exposure_usd": 5802609.97,
"recoverable_pct": 0.83
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109525",
"label": "benign",
"label_confidence": 0.569,
"severity": "critical",
"timestamp": "2026-01-07T14:45:00Z",
"trace_id": "41932c60-806f-9bb3-3662-9bb14d8d5bde"
} | {
"account_age_days": 1971,
"account_id": "ACCT-2097B535EBA6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.352
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 830,
"timestamp": "2026-01-07T14:45:00Z",
"transaction_amount_usd": 1517.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2557.61,
"financial_exposure_usd": 5808.59,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102742",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "critical",
"timestamp": "2026-01-02T21:42:00Z",
"trace_id": "045361a2-147e-3c49-51fd-68c0e4c16520"
} | {
"account_age_days": 1385,
"account_id": "ACCT-D268C45EBB72",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_1",
"session_entropy": 0.124
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 876,
"timestamp": "2026-01-02T21:42:00Z",
"transaction_amount_usd": 31295.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 548663.53,
"financial_exposure_usd": 818942.96,
"recoverable_pct": 0.483
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106367",
"label": "fraudulent",
"label_confidence": 0.699,
"severity": "high",
"timestamp": "2026-01-05T10:07:00Z",
"trace_id": "bb25fb80-69e6-7d06-4121-1999eb1647a3"
} | {
"account_age_days": 1328,
"account_id": "ACCT-69DB88B9E4A7",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_3",
"session_entropy": 0.739
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 381,
"timestamp": "2026-01-04T23:36:00Z",
"transaction_amount_usd": 21.65
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.812,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1801132.93,
"financial_exposure_usd": 2257427.39,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108264",
"label": "benign",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-06T17:44:00Z",
"trace_id": "eeea6886-d946-c9f1-20fa-9b706485f1d1"
} | {
"account_age_days": 441,
"account_id": "ACCT-C24CBC1EFF34",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_3",
"session_entropy": 0.868
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 202,
"timestamp": "2026-01-06T08:51:00Z",
"transaction_amount_usd": 0.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2907.58,
"financial_exposure_usd": 4223.22,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105135",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "high",
"timestamp": "2026-01-04T13:35:00Z",
"trace_id": "4382c278-5119-545d-c7ef-9cc16c50e461"
} | {
"account_age_days": 297,
"account_id": "ACCT-8C248A7CD9A1",
"baseline_risk_score": 0.204,
"kyc_tier": "tier_2",
"session_entropy": 0.777
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 1164,
"timestamp": "2026-01-04T13:35:00Z",
"transaction_amount_usd": 151793.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.531,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3432346.44,
"financial_exposure_usd": 6463741.22,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102077",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "high",
"timestamp": "2026-01-02T10:37:00Z",
"trace_id": "9a0a2b9d-2fb9-259f-565a-a1e994455558"
} | {
"account_age_days": 359,
"account_id": "ACCT-E77580F6F7A1",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_1",
"session_entropy": 0.317
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 164,
"timestamp": "2026-01-02T10:37:00Z",
"transaction_amount_usd": 59259.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.863,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 969788.32,
"financial_exposure_usd": 1199398.83,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102862",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "low",
"timestamp": "2026-01-02T23:42:00Z",
"trace_id": "804feb93-7009-d43c-2e64-a9e1cc8eb5b6"
} | {
"account_age_days": 210,
"account_id": "ACCT-560D8398EDA2",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_1",
"session_entropy": 0.572
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1139,
"timestamp": "2026-01-02T23:42:00Z",
"transaction_amount_usd": 39931.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.719,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 794758.55,
"financial_exposure_usd": 1194190.71,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103463",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "high",
"timestamp": "2026-01-03T09:43:00Z",
"trace_id": "dd01a7e2-a927-6aef-c873-f56c52796ba0"
} | {
"account_age_days": 715,
"account_id": "ACCT-B5CA96F3F0F3",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_3",
"session_entropy": 0.944
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 454,
"timestamp": "2026-01-03T09:43:00Z",
"transaction_amount_usd": 2410273
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.688,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3663019.4,
"financial_exposure_usd": 4223174.65,
"recoverable_pct": 0.442
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106643",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "medium",
"timestamp": "2026-01-05T14:43:00Z",
"trace_id": "cfae3503-4cc7-19ea-34e8-f5317b75996e"
} | {
"account_age_days": 364,
"account_id": "ACCT-4A9B2DC1F838",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.329
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 280,
"timestamp": "2026-01-05T14:43:00Z",
"transaction_amount_usd": 1721025.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.585,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1352755.1,
"financial_exposure_usd": 1670607.4,
"recoverable_pct": 0.973
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109426",
"label": "benign",
"label_confidence": 0.714,
"severity": "low",
"timestamp": "2026-01-07T13:06:00Z",
"trace_id": "ea727c11-9be5-942c-c348-44386bc00241"
} | {
"account_age_days": 1485,
"account_id": "ACCT-62286C5E913F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.297
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 549,
"timestamp": "2026-01-07T13:06:00Z",
"transaction_amount_usd": 10234.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.532,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3639.85,
"financial_exposure_usd": 6358.11,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102405",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-02T16:05:00Z",
"trace_id": "c5c280d2-b190-724e-cbab-f644baef21a6"
} | {
"account_age_days": 650,
"account_id": "ACCT-4331CB96DA52",
"baseline_risk_score": 0.462,
"kyc_tier": "tier_1",
"session_entropy": 0.398
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 608,
"timestamp": "2026-01-02T16:05:00Z",
"transaction_amount_usd": 67547.21
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.823,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 522224.86,
"financial_exposure_usd": 695255.42,
"recoverable_pct": 0.019
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104375",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "medium",
"timestamp": "2026-01-04T00:55:00Z",
"trace_id": "7fa0c79c-c28a-5b5a-76b8-d6c5f72c4fb4"
} | {
"account_age_days": 110,
"account_id": "ACCT-583F23014BDC",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.448
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 339,
"timestamp": "2026-01-03T20:46:00Z",
"transaction_amount_usd": 10.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4742355.18,
"financial_exposure_usd": 5521696.68,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102509",
"label": "fraudulent",
"label_confidence": 0.841,
"severity": "medium",
"timestamp": "2026-01-02T17:49:00Z",
"trace_id": "1a99b201-77f2-feeb-e7e4-527cbcb6b36f"
} | {
"account_age_days": 1792,
"account_id": "ACCT-8F0A9BD64ABA",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_2",
"session_entropy": 0.63
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 463,
"timestamp": "2026-01-02T17:49:00Z",
"transaction_amount_usd": 31414.14
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.57,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 710665.66,
"financial_exposure_usd": 1007564.77,
"recoverable_pct": 0.312
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100094",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "low",
"timestamp": "2026-01-01T01:34:00Z",
"trace_id": "dc420980-0059-5e29-a226-a75bb432ece9"
} | {
"account_age_days": 232,
"account_id": "ACCT-1BFF56F413B2",
"baseline_risk_score": 0.406,
"kyc_tier": "tier_3",
"session_entropy": 0.24
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 393,
"timestamp": "2025-12-31T14:15:00Z",
"transaction_amount_usd": 10.65
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.648,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 294631,
"financial_exposure_usd": 413567.93,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109548",
"label": "benign",
"label_confidence": 0.71,
"severity": "critical",
"timestamp": "2026-01-07T15:08:00Z",
"trace_id": "f0750ce7-1a58-c68e-4ef3-efd749aa519b"
} | {
"account_age_days": 295,
"account_id": "ACCT-E3633C182B68",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.194
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 637,
"timestamp": "2026-01-07T15:08:00Z",
"transaction_amount_usd": 14203.27
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2926.54,
"financial_exposure_usd": 3742.56,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106463",
"label": "fraudulent",
"label_confidence": 0.7,
"severity": "high",
"timestamp": "2026-01-05T11:43:00Z",
"trace_id": "68c740e1-e154-fdba-d11a-363addc2abd4"
} | {
"account_age_days": 211,
"account_id": "ACCT-D8B9F162ED86",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_1",
"session_entropy": 0.659
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 81,
"timestamp": "2026-01-05T11:43:00Z",
"transaction_amount_usd": 805162.2
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.353,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2626628.22,
"financial_exposure_usd": 2809853.63,
"recoverable_pct": 0.511
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100400",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-01T06:40:00Z",
"trace_id": "66d77338-bdff-d9c6-226c-c1ec1b46f9d7"
} | {
"account_age_days": 1217,
"account_id": "ACCT-FA19E10D89E4",
"baseline_risk_score": 0.261,
"kyc_tier": "tier_3",
"session_entropy": 0.581
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1092,
"timestamp": "2026-01-01T06:40:00Z",
"transaction_amount_usd": 53154.01
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.906,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 512724.45,
"financial_exposure_usd": 818469.86,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100099",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "high",
"timestamp": "2026-01-01T01:39:00Z",
"trace_id": "c6523c3d-04d0-7f29-13e6-75fd1c99d366"
} | {
"account_age_days": 837,
"account_id": "ACCT-36DAA93A6C91",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_1",
"session_entropy": 0.537
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 201,
"timestamp": "2026-01-01T01:39:00Z",
"transaction_amount_usd": 5580.77
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.424,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 548474.75,
"financial_exposure_usd": 770506.59,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105942",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "low",
"timestamp": "2026-01-05T03:02:00Z",
"trace_id": "404e2ae5-5e1e-ff4d-5df4-a5fb7b650295"
} | {
"account_age_days": 886,
"account_id": "ACCT-2C64DD087488",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.678
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 495,
"timestamp": "2026-01-05T03:02:00Z",
"transaction_amount_usd": 1411340.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.469,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 205261.84,
"financial_exposure_usd": 318896.79,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100875",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-01T14:35:00Z",
"trace_id": "35e97e82-89ea-0125-d208-8692b1cc56af"
} | {
"account_age_days": 1771,
"account_id": "ACCT-587EE4BE69FB",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_3",
"session_entropy": 0.103
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 589,
"timestamp": "2026-01-01T14:35:00Z",
"transaction_amount_usd": 87219.48
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.808,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 694430.74,
"financial_exposure_usd": 1133428.3,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101703",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-02T04:23:00Z",
"trace_id": "9b5df014-4a98-7feb-ee98-5b8a45031020"
} | {
"account_age_days": 1632,
"account_id": "ACCT-56D941FECB66",
"baseline_risk_score": 0.642,
"kyc_tier": "tier_2",
"session_entropy": 0.298
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 596,
"timestamp": "2026-01-02T04:23:00Z",
"transaction_amount_usd": 16715.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 996899.88,
"financial_exposure_usd": 1189672.09,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109901",
"label": "benign",
"label_confidence": 0.593,
"severity": "medium",
"timestamp": "2026-01-07T21:01:00Z",
"trace_id": "e10b26ff-11ae-111c-4ba3-ab2f26f62cc9"
} | {
"account_age_days": 1458,
"account_id": "ACCT-635DC028E614",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_2",
"session_entropy": 0.538
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 393,
"timestamp": "2026-01-07T10:23:00Z",
"transaction_amount_usd": 20.94
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 378.74,
"financial_exposure_usd": 522.74,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103873",
"label": "fraudulent",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-03T16:33:00Z",
"trace_id": "b1e8d863-8930-6646-213b-f20d1d66cab3"
} | {
"account_age_days": 510,
"account_id": "ACCT-A2789F8E0C07",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_1",
"session_entropy": 0.587
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 373,
"timestamp": "2026-01-03T09:01:00Z",
"transaction_amount_usd": 0.75
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.382,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2491959.93,
"financial_exposure_usd": 3436468.73,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103483",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-03T10:03:00Z",
"trace_id": "ae65fc25-824c-f7c1-67ab-dc2dc10be3f2"
} | {
"account_age_days": 388,
"account_id": "ACCT-4C458CAC5480",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_3",
"session_entropy": 0.167
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 170,
"timestamp": "2026-01-03T06:56:00Z",
"transaction_amount_usd": 7.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.611,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5803877.8,
"financial_exposure_usd": 7028118.88,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102100",
"label": "fraudulent",
"label_confidence": 0.87,
"severity": "critical",
"timestamp": "2026-01-02T11:00:00Z",
"trace_id": "53ae0276-44d8-2a9d-9176-39e5eefc9095"
} | {
"account_age_days": 952,
"account_id": "ACCT-486D8D324CB5",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_1",
"session_entropy": 0.642
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1106,
"timestamp": "2026-01-02T11:00:00Z",
"transaction_amount_usd": 112607.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.92,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 431516.79,
"financial_exposure_usd": 675878.06,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101008",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "critical",
"timestamp": "2026-01-01T16:48:00Z",
"trace_id": "8fd4c346-3be9-03c4-5952-5d09bbde5189"
} | {
"account_age_days": 329,
"account_id": "ACCT-D8230AB6BDAB",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1036,
"timestamp": "2026-01-01T16:48:00Z",
"transaction_amount_usd": 103194.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.633,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 466012.35,
"financial_exposure_usd": 1027799.81,
"recoverable_pct": 0.314
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100746",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-01T12:26:00Z",
"trace_id": "0858d8f4-25a9-65a3-ac8e-0f04b0787008"
} | {
"account_age_days": 1438,
"account_id": "ACCT-1406BA9F7839",
"baseline_risk_score": 0.517,
"kyc_tier": "tier_2",
"session_entropy": 0.208
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 601,
"timestamp": "2026-01-01T12:26:00Z",
"transaction_amount_usd": 16387.7
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.352,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 8783.58,
"financial_exposure_usd": 8981.57,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103780",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-03T15:00:00Z",
"trace_id": "c0f9db4b-b4b5-664f-a2f1-d83f4490b1ab"
} | {
"account_age_days": 1561,
"account_id": "ACCT-D04A4E2F6B9C",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_1",
"session_entropy": 0.587
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1156,
"timestamp": "2026-01-03T15:00:00Z",
"transaction_amount_usd": 713027.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.742,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3061858.47,
"financial_exposure_usd": 4217684.16,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101052",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "high",
"timestamp": "2026-01-01T17:32:00Z",
"trace_id": "d5c2c640-dae7-a549-1acc-ff212fb4c5d7"
} | {
"account_age_days": 739,
"account_id": "ACCT-4F9721C6AE0E",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_3",
"session_entropy": 0.466
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 313,
"timestamp": "2026-01-01T09:31:00Z",
"transaction_amount_usd": 23.64
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.893,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 431163.38,
"financial_exposure_usd": 1054010.79,
"recoverable_pct": 0.256
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103568",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "high",
"timestamp": "2026-01-03T11:28:00Z",
"trace_id": "c5aa2f6c-4859-717a-a3ea-c8494a7924ed"
} | {
"account_age_days": 1255,
"account_id": "ACCT-410D6236E82C",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_1",
"session_entropy": 0.873
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1042,
"timestamp": "2026-01-03T11:28:00Z",
"transaction_amount_usd": 1001451.2
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.5,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND... | {
"customer_funds_at_risk_usd": 4965591.87,
"financial_exposure_usd": 7017313.77,
"recoverable_pct": 0.992
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105028",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "low",
"timestamp": "2026-01-04T11:48:00Z",
"trace_id": "d5530ef4-4d05-0b54-14f8-6ecebb3b67cc"
} | {
"account_age_days": 1584,
"account_id": "ACCT-E67FA6701741",
"baseline_risk_score": 0.052,
"kyc_tier": "tier_2",
"session_entropy": 0.144
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 114,
"timestamp": "2026-01-04T11:48:00Z",
"transaction_amount_usd": 68781.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.882,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3318308.16,
"financial_exposure_usd": 4188324.27,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105309",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "high",
"timestamp": "2026-01-04T16:29:00Z",
"trace_id": "830099ce-069b-6f0b-8184-7d23170a876a"
} | {
"account_age_days": 997,
"account_id": "ACCT-F4FD78C91160",
"baseline_risk_score": 0.079,
"kyc_tier": "tier_3",
"session_entropy": 0.75
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 412,
"timestamp": "2026-01-04T16:29:00Z",
"transaction_amount_usd": 488666.5
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4543995.79,
"financial_exposure_usd": 5318097.07,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103648",
"label": "fraudulent",
"label_confidence": 0.817,
"severity": "critical",
"timestamp": "2026-01-03T12:48:00Z",
"trace_id": "c83336e2-9b7e-542c-4aef-6837b99c56ca"
} | {
"account_age_days": 643,
"account_id": "ACCT-F242E30EA004",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_3",
"session_entropy": 0.575
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 150,
"timestamp": "2026-01-03T02:05:00Z",
"transaction_amount_usd": 8.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.384,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2714854.87,
"financial_exposure_usd": 3150868.38,
"recoverable_pct": 0.797
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104638",
"label": "fraudulent",
"label_confidence": 0.694,
"severity": "critical",
"timestamp": "2026-01-04T05:18:00Z",
"trace_id": "e33a29b5-44d2-483f-d599-667779289fda"
} | {
"account_age_days": 789,
"account_id": "ACCT-FDE70F663B4E",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_2",
"session_entropy": 0.399
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 921,
"timestamp": "2026-01-04T05:18:00Z",
"transaction_amount_usd": 806833.15
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.364,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3445444.44,
"financial_exposure_usd": 4537727.11,
"recoverable_pct": 0.622
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108408",
"label": "benign",
"label_confidence": 0.715,
"severity": "high",
"timestamp": "2026-01-06T20:08:00Z",
"trace_id": "b3b6a485-9282-7a98-0de3-da0761fde7e3"
} | {
"account_age_days": 46,
"account_id": "ACCT-254935DD38DA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.817
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 300,
"timestamp": "2026-01-06T08:14:00Z",
"transaction_amount_usd": 5.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.716,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1313.05,
"financial_exposure_usd": 2329.56,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105721",
"label": "fraudulent",
"label_confidence": 0.733,
"severity": "medium",
"timestamp": "2026-01-04T23:21:00Z",
"trace_id": "b4ec4926-3a74-6bb0-92dd-292f96b13bbf"
} | {
"account_age_days": 1042,
"account_id": "ACCT-1E18458D7CBE",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.771
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 534,
"timestamp": "2026-01-04T23:21:00Z",
"transaction_amount_usd": 1324832.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1045810.16,
"financial_exposure_usd": 1548967.96,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106271",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "high",
"timestamp": "2026-01-05T08:31:00Z",
"trace_id": "be719e3f-0aae-a6bf-09d0-e54f2c0fd2b7"
} | {
"account_age_days": 1738,
"account_id": "ACCT-9001BF5920F3",
"baseline_risk_score": 0.442,
"kyc_tier": "tier_1",
"session_entropy": 0.546
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 266,
"timestamp": "2026-01-04T22:44:00Z",
"transaction_amount_usd": 15.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.847,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2700373.26,
"financial_exposure_usd": 4089846.85,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103614",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "high",
"timestamp": "2026-01-03T12:14:00Z",
"trace_id": "3e440f9b-1770-7780-594c-ed131a5b5962"
} | {
"account_age_days": 521,
"account_id": "ACCT-D20EE05F24DF",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_3",
"session_entropy": 0.123
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 227,
"timestamp": "2026-01-03T06:34:00Z",
"transaction_amount_usd": 21.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.366,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5128498.78,
"financial_exposure_usd": 5597877.6,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109673",
"label": "benign",
"label_confidence": 0.633,
"severity": "low",
"timestamp": "2026-01-07T17:13:00Z",
"trace_id": "5432d405-4688-0027-f407-fec4cd7602fd"
} | {
"account_age_days": 83,
"account_id": "ACCT-A673C2F8D380",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_1",
"session_entropy": 0.242
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 637,
"timestamp": "2026-01-07T17:13:00Z",
"transaction_amount_usd": 7704.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 823.67,
"financial_exposure_usd": 1057.99,
"recoverable_pct": 0.877
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100989",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-01T16:29:00Z",
"trace_id": "969b62c2-e903-6f51-d4d5-0e9d8ae392cd"
} | {
"account_age_days": 1412,
"account_id": "ACCT-246CE79BC21D",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_1",
"session_entropy": 0.49
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 137,
"timestamp": "2026-01-01T16:29:00Z",
"transaction_amount_usd": 63586.19
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.752,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 514539.43,
"financial_exposure_usd": 633853.42,
"recoverable_pct": 0.286
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104308",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-03T23:48:00Z",
"trace_id": "3696173e-1b20-3879-1334-1f49dffdaf29"
} | {
"account_age_days": 569,
"account_id": "ACCT-B0A9A626E595",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.946
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 352,
"timestamp": "2026-01-03T15:38:00Z",
"transaction_amount_usd": 9.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.699,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4141010.53,
"financial_exposure_usd": 5177580.59,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.