Datasets:
schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108493",
"label": "benign",
"label_confidence": 0.623,
"severity": "low",
"timestamp": "2026-01-06T21:33:00Z",
"trace_id": "d640adab-2af9-98cb-233a-9c1da8b247cf"
} | {
"account_age_days": 346,
"account_id": "ACCT-FAA476D3D385",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.517
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 239,
"timestamp": "2026-01-06T15:16:00Z",
"transaction_amount_usd": 15.91
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1151.86,
"financial_exposure_usd": 1548.53,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104722",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "medium",
"timestamp": "2026-01-04T06:42:00Z",
"trace_id": "9462ffba-7fb2-2728-0261-9771cfd8e821"
} | {
"account_age_days": 553,
"account_id": "ACCT-F5255FD490EE",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_1",
"session_entropy": 0.632
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1056,
"timestamp": "2026-01-04T06:42:00Z",
"transaction_amount_usd": 2632874.55
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.886,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4984361.33,
"financial_exposure_usd": 5292518.76,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102793",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "critical",
"timestamp": "2026-01-02T22:33:00Z",
"trace_id": "16ac154b-4def-0201-bbfe-99c10945b08e"
} | {
"account_age_days": 937,
"account_id": "ACCT-4BF39254554A",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_1",
"session_entropy": 0.711
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 602,
"timestamp": "2026-01-02T22:33:00Z",
"transaction_amount_usd": 59509.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.574,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 686482.15,
"financial_exposure_usd": 791374.25,
"recoverable_pct": 0.082
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105209",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-04T14:49:00Z",
"trace_id": "98cec11a-dd1d-9dec-15fe-85a6bc469ac1"
} | {
"account_age_days": 670,
"account_id": "ACCT-AABDF4D08932",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_1",
"session_entropy": 0.269
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 273,
"timestamp": "2026-01-04T14:49:00Z",
"transaction_amount_usd": 1259308.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.625,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3262728.91,
"financial_exposure_usd": 4139717.47,
"recoverable_pct": 0.752
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105641",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-04T22:01:00Z",
"trace_id": "9cc32b4a-822a-5f1c-40c7-75abe99b88f3"
} | {
"account_age_days": 4,
"account_id": "ACCT-7C2396732CBE",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_2",
"session_entropy": 0.565
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 572,
"timestamp": "2026-01-04T22:01:00Z",
"transaction_amount_usd": 2942811.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.353,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5414028.49,
"financial_exposure_usd": 5571750.95,
"recoverable_pct": 0.836
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106478",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "high",
"timestamp": "2026-01-05T11:58:00Z",
"trace_id": "0f65028c-e060-77dd-be76-d0bdc7e0d8d2"
} | {
"account_age_days": 271,
"account_id": "ACCT-D05E75638124",
"baseline_risk_score": 0.414,
"kyc_tier": "tier_2",
"session_entropy": 0.395
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 970,
"timestamp": "2026-01-05T11:58:00Z",
"transaction_amount_usd": 2455911.08
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.614,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4552683.61,
"financial_exposure_usd": 5294248.42,
"recoverable_pct": 0.795
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109387",
"label": "benign",
"label_confidence": 0.602,
"severity": "high",
"timestamp": "2026-01-07T12:27:00Z",
"trace_id": "c5bf6292-182a-d014-4b2c-b369e5d0bedf"
} | {
"account_age_days": 915,
"account_id": "ACCT-88C311B09AA0",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_3",
"session_entropy": 0.37
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 95,
"timestamp": "2026-01-07T03:48:00Z",
"transaction_amount_usd": 12.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.791,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2109.19,
"financial_exposure_usd": 2711.3,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109343",
"label": "benign",
"label_confidence": 0.638,
"severity": "low",
"timestamp": "2026-01-07T11:43:00Z",
"trace_id": "33064d97-ff24-19df-885b-be9252baa699"
} | {
"account_age_days": 1494,
"account_id": "ACCT-D98DD0FAE0DC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.779
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 537,
"timestamp": "2026-01-07T11:43:00Z",
"transaction_amount_usd": 11041.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.578,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 721.29,
"financial_exposure_usd": 781.13,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104193",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "low",
"timestamp": "2026-01-03T21:53:00Z",
"trace_id": "ef0ca128-9d6d-a18d-169e-a7ea73c904ac"
} | {
"account_age_days": 1888,
"account_id": "ACCT-730F7E3C3E3B",
"baseline_risk_score": 0.209,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 456,
"timestamp": "2026-01-03T21:53:00Z",
"transaction_amount_usd": 351276.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.827,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1231409.45,
"financial_exposure_usd": 2988494.43,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108214",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-06T16:54:00Z",
"trace_id": "2b3779be-48c4-7d21-2d6c-6606bb301279"
} | {
"account_age_days": 1303,
"account_id": "ACCT-380B73B1BE8E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.892
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 350,
"timestamp": "2026-01-06T15:12:00Z",
"transaction_amount_usd": 24.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 848.18,
"financial_exposure_usd": 1119.54,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105989",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "critical",
"timestamp": "2026-01-05T03:49:00Z",
"trace_id": "3e2ff374-b3bd-eaec-cc39-7510dd506590"
} | {
"account_age_days": 1939,
"account_id": "ACCT-F33AAF911AC5",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.658
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 520,
"timestamp": "2026-01-05T03:49:00Z",
"transaction_amount_usd": 2622727.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.492,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5468458.74,
"financial_exposure_usd": 5641369.68,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108618",
"label": "benign",
"label_confidence": 0.548,
"severity": "low",
"timestamp": "2026-01-06T23:38:00Z",
"trace_id": "b798e23c-4bc1-0c76-69cd-7a8e438c0b70"
} | {
"account_age_days": 556,
"account_id": "ACCT-A88E50D5C602",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.547
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 227,
"timestamp": "2026-01-06T18:46:00Z",
"transaction_amount_usd": 24.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3670.53,
"financial_exposure_usd": 4076.48,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108030",
"label": "benign",
"label_confidence": 0.648,
"severity": "high",
"timestamp": "2026-01-06T13:50:00Z",
"trace_id": "d05d45e9-4f96-524f-ff48-1d3eb5f8dfad"
} | {
"account_age_days": 1008,
"account_id": "ACCT-089E8ED25925",
"baseline_risk_score": 0.174,
"kyc_tier": "tier_1",
"session_entropy": 0.377
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 524,
"timestamp": "2026-01-06T13:50:00Z",
"transaction_amount_usd": 3766.27
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 849.72,
"financial_exposure_usd": 1364.93,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103007",
"label": "fraudulent",
"label_confidence": 0.882,
"severity": "critical",
"timestamp": "2026-01-03T02:07:00Z",
"trace_id": "2adcc350-e7ce-fb56-c150-d068a3326656"
} | {
"account_age_days": 147,
"account_id": "ACCT-A28E8B0320B8",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_1",
"session_entropy": 0.907
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 814,
"timestamp": "2026-01-03T02:07:00Z",
"transaction_amount_usd": 33166.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 669574.48,
"financial_exposure_usd": 1025672.09,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100537",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "critical",
"timestamp": "2026-01-01T08:57:00Z",
"trace_id": "063c47eb-4110-df55-d8b0-8cf3e2cdd04c"
} | {
"account_age_days": 1012,
"account_id": "ACCT-316B70DAB9A2",
"baseline_risk_score": 0.543,
"kyc_tier": "tier_3",
"session_entropy": 0.717
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 388,
"timestamp": "2026-01-01T00:04:00Z",
"transaction_amount_usd": 8.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.759,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 548258.12,
"financial_exposure_usd": 826101.33,
"recoverable_pct": 0.09
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103070",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "high",
"timestamp": "2026-01-03T03:10:00Z",
"trace_id": "e74f9a8f-d8d8-ef10-bc76-ef531d6568b9"
} | {
"account_age_days": 1303,
"account_id": "ACCT-52240B17DE97",
"baseline_risk_score": 0.572,
"kyc_tier": "tier_1",
"session_entropy": 0.9
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 402,
"timestamp": "2026-01-03T03:10:00Z",
"transaction_amount_usd": 81079.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.847,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 279812.53,
"financial_exposure_usd": 513416.37,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102567",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "high",
"timestamp": "2026-01-02T18:47:00Z",
"trace_id": "390b295c-2863-40af-7d2c-caab1bc6e1a8"
} | {
"account_age_days": 1109,
"account_id": "ACCT-DE33628C96F3",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_3",
"session_entropy": 0.254
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 230,
"timestamp": "2026-01-02T18:47:00Z",
"transaction_amount_usd": 46118.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 492541.99,
"financial_exposure_usd": 1003464.08,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105646",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "medium",
"timestamp": "2026-01-04T22:06:00Z",
"trace_id": "35c1248f-e17d-825a-322e-e77375d63af2"
} | {
"account_age_days": 1825,
"account_id": "ACCT-155DB64FE75C",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_3",
"session_entropy": 0.18
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 102,
"timestamp": "2026-01-04T22:06:00Z",
"transaction_amount_usd": 2023824.68
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.596,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2272362.5,
"financial_exposure_usd": 4261999.71,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107712",
"label": "benign",
"label_confidence": 0.503,
"severity": "medium",
"timestamp": "2026-01-06T08:32:00Z",
"trace_id": "a6ce0ce8-2b71-60ed-ea94-03e387cd0990"
} | {
"account_age_days": 323,
"account_id": "ACCT-6E53FFEB12BD",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.439
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 192,
"timestamp": "2026-01-06T05:50:00Z",
"transaction_amount_usd": 2.64
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 827.29,
"financial_exposure_usd": 1403.55,
"recoverable_pct": 0.89
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105699",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-04T22:59:00Z",
"trace_id": "c3ffaccc-760d-6cf1-b392-c85dddf2b18f"
} | {
"account_age_days": 1448,
"account_id": "ACCT-7B6FF7279060",
"baseline_risk_score": 0.187,
"kyc_tier": "tier_3",
"session_entropy": 0.897
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 340,
"timestamp": "2026-01-04T22:59:00Z",
"transaction_amount_usd": 1845149.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.721,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5107861.84,
"financial_exposure_usd": 5337262.54,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106592",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "medium",
"timestamp": "2026-01-05T13:52:00Z",
"trace_id": "d93aaf7b-1a37-1f1f-f182-ed270a3dad48"
} | {
"account_age_days": 1266,
"account_id": "ACCT-A75934FBE117",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_1",
"session_entropy": 0.897
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 123,
"timestamp": "2026-01-05T13:52:00Z",
"transaction_amount_usd": 1542995.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4869878.75,
"financial_exposure_usd": 4947958.79,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104459",
"label": "fraudulent",
"label_confidence": 0.65,
"severity": "medium",
"timestamp": "2026-01-04T02:19:00Z",
"trace_id": "214be4da-e4a8-765d-7ef7-5bf7cdd3c974"
} | {
"account_age_days": 1026,
"account_id": "ACCT-F0E8DC5D1D15",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.306
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 188,
"timestamp": "2026-01-03T21:35:00Z",
"transaction_amount_usd": 21.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.925,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1471536.89,
"financial_exposure_usd": 2520928.49,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109084",
"label": "benign",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-07T07:24:00Z",
"trace_id": "30d5f999-8022-834b-e18a-0e3ebb0ca23c"
} | {
"account_age_days": 1065,
"account_id": "ACCT-AFE11C745D81",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.707
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 371,
"timestamp": "2026-01-07T01:12:00Z",
"transaction_amount_usd": 8.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1246.72,
"financial_exposure_usd": 2839.15,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103308",
"label": "fraudulent",
"label_confidence": 0.966,
"severity": "critical",
"timestamp": "2026-01-03T07:08:00Z",
"trace_id": "42ecc97c-78b5-3908-08ba-e341d31b488b"
} | {
"account_age_days": 618,
"account_id": "ACCT-502B06B8CABA",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_3",
"session_entropy": 0.166
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 359,
"timestamp": "2026-01-03T02:24:00Z",
"transaction_amount_usd": 22.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 385062.75,
"financial_exposure_usd": 959377.17,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109763",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T18:43:00Z",
"trace_id": "d84aaa3c-3d0f-1a07-5acf-f7fc50cbeac0"
} | {
"account_age_days": 403,
"account_id": "ACCT-347E962D0E79",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 101,
"timestamp": "2026-01-07T06:59:00Z",
"transaction_amount_usd": 0.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 487.81,
"financial_exposure_usd": 1127.68,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100628",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "critical",
"timestamp": "2026-01-01T10:28:00Z",
"trace_id": "e1e0815b-7cff-c3db-db37-e876708b042f"
} | {
"account_age_days": 454,
"account_id": "ACCT-55177750971C",
"baseline_risk_score": 0.529,
"kyc_tier": "tier_1",
"session_entropy": 0.386
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 146,
"timestamp": "2026-01-01T09:25:00Z",
"transaction_amount_usd": 23.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1117538.8,
"financial_exposure_usd": 1337027.4,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102897",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "low",
"timestamp": "2026-01-03T00:17:00Z",
"trace_id": "7df2d3b7-4080-80f9-54e8-69fc259eaeaf"
} | {
"account_age_days": 740,
"account_id": "ACCT-66E819E99DB4",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_3",
"session_entropy": 0.338
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 695,
"timestamp": "2026-01-03T00:17:00Z",
"transaction_amount_usd": 69897.37
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.844,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 584676.77,
"financial_exposure_usd": 661055.5,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107948",
"label": "benign",
"label_confidence": 0.585,
"severity": "medium",
"timestamp": "2026-01-06T12:28:00Z",
"trace_id": "15030bc4-bd5c-1e32-e5d4-c4e7199de0d1"
} | {
"account_age_days": 1219,
"account_id": "ACCT-9D0416212327",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.159
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1138,
"timestamp": "2026-01-06T12:28:00Z",
"transaction_amount_usd": 10328.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 40.13,
"financial_exposure_usd": 96.87,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108900",
"label": "benign",
"label_confidence": 0.586,
"severity": "high",
"timestamp": "2026-01-07T04:20:00Z",
"trace_id": "27785605-7b77-8cef-ad56-cef226d1625b"
} | {
"account_age_days": 1824,
"account_id": "ACCT-3141E529C152",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.368
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 352,
"timestamp": "2026-01-07T04:20:00Z",
"transaction_amount_usd": 852.89
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2890.39,
"financial_exposure_usd": 2898.46,
"recoverable_pct": 0.91
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105489",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "high",
"timestamp": "2026-01-04T19:29:00Z",
"trace_id": "1aeeb9e2-20e3-9ff9-c313-e3f1b4af4e5c"
} | {
"account_age_days": 1030,
"account_id": "ACCT-B21C192DAE79",
"baseline_risk_score": 0.202,
"kyc_tier": "tier_3",
"session_entropy": 0.605
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 370,
"timestamp": "2026-01-04T14:32:00Z",
"transaction_amount_usd": 2.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.482,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4376540.88,
"financial_exposure_usd": 5197986.82,
"recoverable_pct": 0.801
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106263",
"label": "fraudulent",
"label_confidence": 0.603,
"severity": "high",
"timestamp": "2026-01-05T08:23:00Z",
"trace_id": "76c4776c-9322-b15a-eccc-14324d8700e0"
} | {
"account_age_days": 680,
"account_id": "ACCT-92AD66B62355",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_3",
"session_entropy": 0.646
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 427,
"timestamp": "2026-01-05T08:23:00Z",
"transaction_amount_usd": 2323723.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.699,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1915687.37,
"financial_exposure_usd": 4013897.55,
"recoverable_pct": 0.466
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104920",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-04T10:00:00Z",
"trace_id": "da0e29b2-ff73-da00-6033-b8d293ab1841"
} | {
"account_age_days": 527,
"account_id": "ACCT-7F9FEDD89614",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_1",
"session_entropy": 0.795
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 119,
"timestamp": "2026-01-04T06:50:00Z",
"transaction_amount_usd": 7.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.693,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3804064.01,
"financial_exposure_usd": 6586791.01,
"recoverable_pct": 0.903
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105369",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-04T17:29:00Z",
"trace_id": "6dd3efb2-fe21-cbcc-2faf-000afa77aff3"
} | {
"account_age_days": 1645,
"account_id": "ACCT-C419769D441E",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_2",
"session_entropy": 0.111
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 191,
"timestamp": "2026-01-04T17:29:00Z",
"transaction_amount_usd": 281868.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3720690.1,
"financial_exposure_usd": 3948096.87,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108032",
"label": "benign",
"label_confidence": 0.52,
"severity": "low",
"timestamp": "2026-01-06T13:52:00Z",
"trace_id": "a41f6919-4b5f-43b5-bc3d-54ee5f985733"
} | {
"account_age_days": 399,
"account_id": "ACCT-F5D322FBB510",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.747
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 260,
"timestamp": "2026-01-06T08:37:00Z",
"transaction_amount_usd": 7.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.722,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2355.61,
"financial_exposure_usd": 4854,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100095",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "medium",
"timestamp": "2026-01-01T01:35:00Z",
"trace_id": "ee854c72-8a9b-7b20-aeb1-fcd3f8360a87"
} | {
"account_age_days": 2000,
"account_id": "ACCT-5F775A7A25DF",
"baseline_risk_score": 0.533,
"kyc_tier": "tier_1",
"session_entropy": 0.481
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 208,
"timestamp": "2026-01-01T01:35:00Z",
"transaction_amount_usd": 50705.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.531,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 465578.93,
"financial_exposure_usd": 724368.82,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103621",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-03T12:21:00Z",
"trace_id": "8429539a-f6e0-f078-953d-41f27f103f8e"
} | {
"account_age_days": 1572,
"account_id": "ACCT-AA9F50745A4B",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_3",
"session_entropy": 0.817
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 99,
"timestamp": "2026-01-03T12:21:00Z",
"transaction_amount_usd": 920878
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IMBA... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.537,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1328088.2,
"financial_exposure_usd": 3315531.09,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107859",
"label": "benign",
"label_confidence": 0.548,
"severity": "critical",
"timestamp": "2026-01-06T10:59:00Z",
"trace_id": "f9b360e4-baa4-ef78-4622-5563287a15b8"
} | {
"account_age_days": 239,
"account_id": "ACCT-AFE9E96336E0",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.231
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 406,
"timestamp": "2026-01-06T10:59:00Z",
"transaction_amount_usd": 6975.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.574,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 439.87,
"financial_exposure_usd": 1052.39,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107390",
"label": "benign",
"label_confidence": 0.458,
"severity": "medium",
"timestamp": "2026-01-06T03:10:00Z",
"trace_id": "436db3b6-8677-cc9c-b744-559cdd6260ae"
} | {
"account_age_days": 1111,
"account_id": "ACCT-6DD04BEC7422",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.7
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 167,
"timestamp": "2026-01-06T03:10:00Z",
"transaction_amount_usd": 7821.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1883.71,
"financial_exposure_usd": 4337.51,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103102",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-03T03:42:00Z",
"trace_id": "d7648674-64d6-568d-1a56-63ce2b0e3b4f"
} | {
"account_age_days": 1538,
"account_id": "ACCT-A5B8A1996D70",
"baseline_risk_score": 0.635,
"kyc_tier": "tier_2",
"session_entropy": 0.697
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 348,
"timestamp": "2026-01-03T03:42:00Z",
"transaction_amount_usd": 91326.77
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.638,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 507296.27,
"financial_exposure_usd": 614740.84,
"recoverable_pct": 0.839
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105384",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "medium",
"timestamp": "2026-01-04T17:44:00Z",
"trace_id": "d03f7d95-de84-3f3a-ca70-a49e4b2ff7a7"
} | {
"account_age_days": 295,
"account_id": "ACCT-40317802E2CD",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_2",
"session_entropy": 0.175
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 163,
"timestamp": "2026-01-04T05:47:00Z",
"transaction_amount_usd": 12.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 640946.79,
"financial_exposure_usd": 1197121.81,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105335",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-04T16:55:00Z",
"trace_id": "1ec9bae0-d901-9599-aa67-4a9cda3d1c85"
} | {
"account_age_days": 759,
"account_id": "ACCT-74FE884D1BE3",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_3",
"session_entropy": 0.669
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 409,
"timestamp": "2026-01-04T16:55:00Z",
"transaction_amount_usd": 2375515.88
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.609,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1285990.33,
"financial_exposure_usd": 2061772.49,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107324",
"label": "benign",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-06T02:04:00Z",
"trace_id": "69ebc5d7-381f-3c8b-f5a0-69a4c0c1b766"
} | {
"account_age_days": 1808,
"account_id": "ACCT-BAE0586C28A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.443
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 774,
"timestamp": "2026-01-06T02:04:00Z",
"transaction_amount_usd": 4177.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.677,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4493.61,
"financial_exposure_usd": 4854.43,
"recoverable_pct": 0.949
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100509",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "medium",
"timestamp": "2026-01-01T08:29:00Z",
"trace_id": "c1b2a715-81fe-7fe9-0fdf-6e69dbda8188"
} | {
"account_age_days": 925,
"account_id": "ACCT-EE1CF2D207A5",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_2",
"session_entropy": 0.243
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1005,
"timestamp": "2026-01-01T08:29:00Z",
"transaction_amount_usd": 53873.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.508,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 497547.94,
"financial_exposure_usd": 795615.3,
"recoverable_pct": 0.105
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109025",
"label": "benign",
"label_confidence": 0.456,
"severity": "medium",
"timestamp": "2026-01-07T06:25:00Z",
"trace_id": "163e7a52-fe9c-7949-c5dc-16f3c12a8076"
} | {
"account_age_days": 1922,
"account_id": "ACCT-A43B359854A7",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_2",
"session_entropy": 0.213
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 663,
"timestamp": "2026-01-07T06:25:00Z",
"transaction_amount_usd": 2155.16
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.671,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3670.71,
"financial_exposure_usd": 3962.31,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107397",
"label": "benign",
"label_confidence": 0.566,
"severity": "critical",
"timestamp": "2026-01-06T03:17:00Z",
"trace_id": "b8b6d794-9f44-6e53-eb42-3ee5e58b8365"
} | {
"account_age_days": 967,
"account_id": "ACCT-9D1886750677",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.916
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 751,
"timestamp": "2026-01-06T03:17:00Z",
"transaction_amount_usd": 3698.89
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2466.64,
"financial_exposure_usd": 2696.01,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101148",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-01T19:08:00Z",
"trace_id": "23dae76c-6836-8d4f-1478-be9be35c05aa"
} | {
"account_age_days": 1965,
"account_id": "ACCT-7F791DF505E8",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_3",
"session_entropy": 0.503
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 645,
"timestamp": "2026-01-01T19:08:00Z",
"transaction_amount_usd": 17888.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.679,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1028206.05,
"financial_exposure_usd": 1102023.44,
"recoverable_pct": 0.201
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109674",
"label": "benign",
"label_confidence": 0.552,
"severity": "low",
"timestamp": "2026-01-07T17:14:00Z",
"trace_id": "6a119713-17ef-dcd8-6ce9-11956e61abca"
} | {
"account_age_days": 1630,
"account_id": "ACCT-97966AB9F502",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.385
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 334,
"timestamp": "2026-01-07T17:14:00Z",
"transaction_amount_usd": 12673.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 599.76,
"financial_exposure_usd": 1236.29,
"recoverable_pct": 0.709
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101521",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "medium",
"timestamp": "2026-01-02T01:21:00Z",
"trace_id": "777c1295-0e24-3eaf-a32e-f57e358e2fbb"
} | {
"account_age_days": 193,
"account_id": "ACCT-373C1CB4B4C5",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_2",
"session_entropy": 0.478
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 298,
"timestamp": "2026-01-01T18:41:00Z",
"transaction_amount_usd": 1.42
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.823,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 232045.41,
"financial_exposure_usd": 562091.52,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107539",
"label": "benign",
"label_confidence": 0.648,
"severity": "low",
"timestamp": "2026-01-06T05:39:00Z",
"trace_id": "f02dafe8-19ec-be4d-68c3-3018d672b3ad"
} | {
"account_age_days": 257,
"account_id": "ACCT-CB699AB0FFEE",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_1",
"session_entropy": 0.893
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 94,
"timestamp": "2026-01-05T21:12:00Z",
"transaction_amount_usd": 20.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7910.26,
"financial_exposure_usd": 8858.39,
"recoverable_pct": 0.991
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100409",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "high",
"timestamp": "2026-01-01T06:49:00Z",
"trace_id": "a11244cb-1243-a7d7-ca22-46d5fe22a8c3"
} | {
"account_age_days": 479,
"account_id": "ACCT-BD1EB06FBF49",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.711
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 913,
"timestamp": "2026-01-01T06:49:00Z",
"transaction_amount_usd": 30299.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.393,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 759197.76,
"financial_exposure_usd": 1466465.74,
"recoverable_pct": 0.315
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103978",
"label": "fraudulent",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-03T18:18:00Z",
"trace_id": "7245d6c9-9960-1e15-9a7b-7a0248b72030"
} | {
"account_age_days": 1752,
"account_id": "ACCT-2056E012945E",
"baseline_risk_score": 0.188,
"kyc_tier": "tier_2",
"session_entropy": 0.37
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 552,
"timestamp": "2026-01-03T18:18:00Z",
"transaction_amount_usd": 1695935.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.517,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1461744.86,
"financial_exposure_usd": 3205672.63,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108024",
"label": "benign",
"label_confidence": 0.701,
"severity": "low",
"timestamp": "2026-01-06T13:44:00Z",
"trace_id": "47546d65-70f1-911d-6657-13a11bd35dac"
} | {
"account_age_days": 542,
"account_id": "ACCT-22F7513B3A2A",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.659
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 340,
"timestamp": "2026-01-06T13:44:00Z",
"transaction_amount_usd": 2672.82
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.547,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 44.18,
"financial_exposure_usd": 50.12,
"recoverable_pct": 0.518
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107985",
"label": "benign",
"label_confidence": 0.638,
"severity": "medium",
"timestamp": "2026-01-06T13:05:00Z",
"trace_id": "df245259-4265-aa4d-1d7e-ae46bf714395"
} | {
"account_age_days": 1579,
"account_id": "ACCT-1650714C1F70",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.636
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 767,
"timestamp": "2026-01-06T13:05:00Z",
"transaction_amount_usd": 2563.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 7613.5,
"financial_exposure_usd": 10175.24,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108587",
"label": "benign",
"label_confidence": 0.649,
"severity": "high",
"timestamp": "2026-01-06T23:07:00Z",
"trace_id": "f75b934a-9661-0fa4-3418-3e8681b3fb8b"
} | {
"account_age_days": 1311,
"account_id": "ACCT-7F7C28D32F32",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.672
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 294,
"timestamp": "2026-01-06T15:16:00Z",
"transaction_amount_usd": 22.48
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.684,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6297.44,
"financial_exposure_usd": 6644.81,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107871",
"label": "benign",
"label_confidence": 0.513,
"severity": "low",
"timestamp": "2026-01-06T11:11:00Z",
"trace_id": "c9f946ff-0524-1b59-e972-b8f963da50d4"
} | {
"account_age_days": 1964,
"account_id": "ACCT-868D5E8EBFAF",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_3",
"session_entropy": 0.384
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 231,
"timestamp": "2026-01-06T11:11:00Z",
"transaction_amount_usd": 5620.71
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.552,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1386.22,
"financial_exposure_usd": 1640.56,
"recoverable_pct": 0.876
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108825",
"label": "benign",
"label_confidence": 0.532,
"severity": "medium",
"timestamp": "2026-01-07T03:05:00Z",
"trace_id": "fb376fb6-5e99-40b9-a174-550e030f4882"
} | {
"account_age_days": 643,
"account_id": "ACCT-E202E693FF14",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_2",
"session_entropy": 0.223
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 339,
"timestamp": "2026-01-07T03:05:00Z",
"transaction_amount_usd": 1028.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1730.22,
"financial_exposure_usd": 3544.57,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106861",
"label": "benign",
"label_confidence": 0.693,
"severity": "medium",
"timestamp": "2026-01-05T18:21:00Z",
"trace_id": "1f840ecc-7ab9-b680-c53c-89b162684ed8"
} | {
"account_age_days": 316,
"account_id": "ACCT-E24F712F0237",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_1",
"session_entropy": 0.293
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 377,
"timestamp": "2026-01-05T12:13:00Z",
"transaction_amount_usd": 10.85
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1900.84,
"financial_exposure_usd": 3701.82,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101138",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "critical",
"timestamp": "2026-01-01T18:58:00Z",
"trace_id": "f8e65bff-c0eb-c0dc-77d9-1e61b2f15b4d"
} | {
"account_age_days": 1598,
"account_id": "ACCT-846E32BEBC3B",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 155,
"timestamp": "2026-01-01T18:58:00Z",
"transaction_amount_usd": 14287.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.57,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 498812.7,
"financial_exposure_usd": 914712.36,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107179",
"label": "benign",
"label_confidence": 0.471,
"severity": "medium",
"timestamp": "2026-01-05T23:39:00Z",
"trace_id": "8d86a22f-e559-600d-10b3-9a18e9ecc6c4"
} | {
"account_age_days": 314,
"account_id": "ACCT-0AE6FF53E51D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.872
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 228,
"timestamp": "2026-01-05T23:39:00Z",
"transaction_amount_usd": 11427.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4042.42,
"financial_exposure_usd": 4444.57,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107633",
"label": "benign",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-06T07:13:00Z",
"trace_id": "725c4bb0-9b02-e588-a15c-517cabb13a97"
} | {
"account_age_days": 1690,
"account_id": "ACCT-4C03BEA9425B",
"baseline_risk_score": 0.1,
"kyc_tier": "tier_2",
"session_entropy": 0.389
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 776,
"timestamp": "2026-01-06T07:13:00Z",
"transaction_amount_usd": 10851.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3436.09,
"financial_exposure_usd": 4459.03,
"recoverable_pct": 0.927
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108037",
"label": "benign",
"label_confidence": 0.637,
"severity": "low",
"timestamp": "2026-01-06T13:57:00Z",
"trace_id": "6722fe02-d427-6c9d-bcb1-7a8f32a7b8f8"
} | {
"account_age_days": 844,
"account_id": "ACCT-F3A6F83EA36C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.434
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 456,
"timestamp": "2026-01-06T13:57:00Z",
"transaction_amount_usd": 9352.56
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4465.47,
"financial_exposure_usd": 4760.28,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101506",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "critical",
"timestamp": "2026-01-02T01:06:00Z",
"trace_id": "84026727-5cb1-c234-f881-8101cf96ad0f"
} | {
"account_age_days": 1969,
"account_id": "ACCT-A1D2872DD0E5",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_3",
"session_entropy": 0.566
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 305,
"timestamp": "2026-01-02T01:06:00Z",
"transaction_amount_usd": 88175.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.611,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 410380.9,
"financial_exposure_usd": 598186.01,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106636",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "critical",
"timestamp": "2026-01-05T14:36:00Z",
"trace_id": "03ebe467-e121-de6b-2532-04b071e0d18f"
} | {
"account_age_days": 987,
"account_id": "ACCT-7B8FFF222279",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_1",
"session_entropy": 0.499
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 337,
"timestamp": "2026-01-05T14:36:00Z",
"transaction_amount_usd": 585261.33
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1928878.98,
"financial_exposure_usd": 2896843.85,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105484",
"label": "fraudulent",
"label_confidence": 0.698,
"severity": "low",
"timestamp": "2026-01-04T19:24:00Z",
"trace_id": "bfdfaa91-a125-e481-0232-247597178a37"
} | {
"account_age_days": 1971,
"account_id": "ACCT-CCA36D28AE0D",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_1",
"session_entropy": 0.536
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 807,
"timestamp": "2026-01-04T19:24:00Z",
"transaction_amount_usd": 1908089.55
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.443,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4290905.1,
"financial_exposure_usd": 4755224.83,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103488",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "medium",
"timestamp": "2026-01-03T10:08:00Z",
"trace_id": "40c98a20-6016-8443-a842-56e0cd54f12e"
} | {
"account_age_days": 232,
"account_id": "ACCT-D1421BF3BD33",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_3",
"session_entropy": 0.518
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 352,
"timestamp": "2026-01-03T05:27:00Z",
"transaction_amount_usd": 3.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.715,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3138067.87,
"financial_exposure_usd": 4342449.33,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102070",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "low",
"timestamp": "2026-01-02T10:30:00Z",
"trace_id": "93bbf083-29b1-9b2c-d338-4d012b487d4f"
} | {
"account_age_days": 1491,
"account_id": "ACCT-CF092CA68CC0",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_2",
"session_entropy": 0.494
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 691,
"timestamp": "2026-01-02T10:30:00Z",
"transaction_amount_usd": 89189.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1252858.21,
"financial_exposure_usd": 1271585.34,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107467",
"label": "benign",
"label_confidence": 0.631,
"severity": "low",
"timestamp": "2026-01-06T04:27:00Z",
"trace_id": "ce42821d-d41c-1e31-df24-be152e3a1a1c"
} | {
"account_age_days": 1192,
"account_id": "ACCT-317D0CB6D7B2",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_3",
"session_entropy": 0.369
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 825,
"timestamp": "2026-01-06T04:27:00Z",
"transaction_amount_usd": 667.89
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.569,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2107.16,
"financial_exposure_usd": 2139.54,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104729",
"label": "fraudulent",
"label_confidence": 0.644,
"severity": "critical",
"timestamp": "2026-01-04T06:49:00Z",
"trace_id": "e6a25191-9969-f3b5-a466-7ffbd01cb7c7"
} | {
"account_age_days": 495,
"account_id": "ACCT-4EC508DC603B",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_3",
"session_entropy": 0.65
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 368,
"timestamp": "2026-01-04T06:49:00Z",
"transaction_amount_usd": 1100022.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.651,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4154806.52,
"financial_exposure_usd": 7497638.3,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101988",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "low",
"timestamp": "2026-01-02T09:08:00Z",
"trace_id": "35a7d7d2-09a1-4b60-7b16-4079624190b5"
} | {
"account_age_days": 1578,
"account_id": "ACCT-1E8EC933C502",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.801
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 402,
"timestamp": "2026-01-02T09:08:00Z",
"transaction_amount_usd": 109937.37
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.872,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 795397.83,
"financial_exposure_usd": 1146518.72,
"recoverable_pct": 0.357
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107136",
"label": "benign",
"label_confidence": 0.631,
"severity": "high",
"timestamp": "2026-01-05T22:56:00Z",
"trace_id": "33d71322-7b92-56a4-9cbc-8ae9e42f0c66"
} | {
"account_age_days": 786,
"account_id": "ACCT-F7907C6BBB0D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.727
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1190,
"timestamp": "2026-01-05T22:56:00Z",
"transaction_amount_usd": 8930.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1285.74,
"financial_exposure_usd": 2266.67,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103918",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "high",
"timestamp": "2026-01-03T17:18:00Z",
"trace_id": "22abda02-b43c-5419-8403-2d21acd3fa54"
} | {
"account_age_days": 98,
"account_id": "ACCT-63932EEEB5C4",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_3",
"session_entropy": 0.532
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1167,
"timestamp": "2026-01-03T17:18:00Z",
"transaction_amount_usd": 1579099.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.439,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3094101.72,
"financial_exposure_usd": 4754333.34,
"recoverable_pct": 0.596
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104376",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-04T00:56:00Z",
"trace_id": "70e72d39-02cd-5c3d-f2a2-2cd025976323"
} | {
"account_age_days": 946,
"account_id": "ACCT-D794081A00D3",
"baseline_risk_score": 0.437,
"kyc_tier": "tier_3",
"session_entropy": 0.778
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 350,
"timestamp": "2026-01-04T00:56:00Z",
"transaction_amount_usd": 2453986.66
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.622,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4994819.08,
"financial_exposure_usd": 5369604.31,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105542",
"label": "fraudulent",
"label_confidence": 0.778,
"severity": "low",
"timestamp": "2026-01-04T20:22:00Z",
"trace_id": "3e4c762d-c672-213a-1032-7e5ff298af82"
} | {
"account_age_days": 1844,
"account_id": "ACCT-6E4F39001BEC",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_2",
"session_entropy": 0.469
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 911,
"timestamp": "2026-01-04T20:22:00Z",
"transaction_amount_usd": 2273430.62
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4603931.17,
"financial_exposure_usd": 5775951.87,
"recoverable_pct": 0.993
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101357",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "low",
"timestamp": "2026-01-01T22:37:00Z",
"trace_id": "9aaedfac-c2c2-598d-a1be-e969f768443b"
} | {
"account_age_days": 993,
"account_id": "ACCT-7D9CF4DC70AF",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_2",
"session_entropy": 0.171
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 940,
"timestamp": "2026-01-01T22:37:00Z",
"transaction_amount_usd": 114057.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.913,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 287253.95,
"financial_exposure_usd": 684548.94,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107513",
"label": "benign",
"label_confidence": 0.591,
"severity": "medium",
"timestamp": "2026-01-06T05:13:00Z",
"trace_id": "0a8db0d9-ff3d-59c9-ad2b-bf40b0d0522e"
} | {
"account_age_days": 1073,
"account_id": "ACCT-39F54E58E9EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.574
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 272,
"timestamp": "2026-01-06T05:13:00Z",
"transaction_amount_usd": 8104.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.784,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 989.87,
"financial_exposure_usd": 1473.7,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106448",
"label": "fraudulent",
"label_confidence": 0.74,
"severity": "low",
"timestamp": "2026-01-05T11:28:00Z",
"trace_id": "47a96162-0ea7-29c9-4f7b-e92c609bfcd1"
} | {
"account_age_days": 966,
"account_id": "ACCT-C6818C6445AD",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_3",
"session_entropy": 0.28
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 249,
"timestamp": "2026-01-05T04:45:00Z",
"transaction_amount_usd": 15.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.785,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6825203.32,
"financial_exposure_usd": 8125466.25,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101971",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "critical",
"timestamp": "2026-01-02T08:51:00Z",
"trace_id": "91fb71f3-01fa-dbaa-7f4f-c415276785ab"
} | {
"account_age_days": 1232,
"account_id": "ACCT-9CBD2CEA32E9",
"baseline_risk_score": 0.429,
"kyc_tier": "tier_3",
"session_entropy": 0.357
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1121,
"timestamp": "2026-01-02T08:51:00Z",
"transaction_amount_usd": 73701.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.772,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 717381.07,
"financial_exposure_usd": 854947.18,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108583",
"label": "benign",
"label_confidence": 0.523,
"severity": "low",
"timestamp": "2026-01-06T23:03:00Z",
"trace_id": "d4822ffa-3e34-f7d8-276b-88545c367272"
} | {
"account_age_days": 1940,
"account_id": "ACCT-A535A6DFFB83",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.576
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 818,
"timestamp": "2026-01-06T23:03:00Z",
"transaction_amount_usd": 2695.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5533.57,
"financial_exposure_usd": 6832.44,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Aestrea Dark Pool Financial Anomaly Pack (Sample)
A synthetic financial-anomaly and fraud-detection dataset for AML / transaction-monitoring model training, false-positive reduction research, and fintech anomaly-detection pipelines. Each row is a complete financial activity sequence — a dormant warm-up period followed by a sudden activity burst — labeled as account takeover, market-manipulation spoofing, or legitimate-but-high-risk (false positive) behavior, with telemetry, identity context, detection logic, and financial exposure.
Built by SolsticeAI as a free sample of a larger commercial pack. 100% synthetic. No real transactions, accounts, addresses, order books, or customer data.
What is included
| File | Rows | Format | Purpose |
|---|---|---|---|
dark_pool_sample.parquet |
10,000 | Parquet | Columnar, typed, best for analytics |
dark_pool_sample.jsonl |
10,000 | JSON Lines | Streaming / LLM training friendly |
This sample: 10,000 financial activity sequences, stratified 3,333 per fraud class.
Fraud classes (3): Account_Takeover_Sequence, Market_Manipulation_Spoofing, Legitimate_High_Risk_Activity (false positive)
Label distribution: ~6,666 fraudulent / ~3,334 benign (by design — one of three scenarios is a benign high-risk lookalike)
Severity tiers: low, medium, high, critical — scenario-weighted so spoofing skews mid, ATO skews high, false-positives skew low
Assets covered: BTC, ETH, USDC, USDT, SOL, USD, EUR, GBP, JPY
Geographic coverage: 20 country codes across high-risk and low-risk jurisdictions
Record structure
Each record is one financial activity sequence with 7 top-level fields:
| Field | Type | Contents |
|---|---|---|
schema_version |
string | Pack schema version (1.0.0-dark-pool-sample) |
event |
struct | id, trace_id, timestamp, severity, label, label_confidence |
identity_context |
struct | account_id, baseline_risk_score, session_entropy, account_age_days, kyc_tier |
telemetry_stream |
list | Ordered financial events: timestamp, event_name (e.g., LARGE_WITHDRAWAL, LIMIT_ORDER_CANCELLED, LOGIN_NEW_COUNTRY), asset, transaction_amount_usd, geo_country, latency_ms, burst_indicator |
vulnerability |
struct | fraud_class, scenario_description, exposure_vector |
detection |
struct | anomaly_type, baseline_deviation, detection_logic (SQL-like), anomaly_score, confidence_band |
impact |
struct | financial_exposure_usd, customer_funds_at_risk_usd, recoverable_pct |
simulation |
struct | synthetic, engine, chaos_profile, ground_truth_classification |
See SCHEMA.md for the full nested field breakdown.
Why this dataset is useful
Most public financial-fraud datasets are either flat tabular snapshots (IEEE-CIS, credit-card fraud) or narrow single-event labels. Real AML / transaction-monitoring models need something these don't provide: sequences (warm-up → burst), ambiguous labels (legitimate-but-high-risk that looks like fraud), and detection logic grounded in behavioral patterns rather than just feature engineering.
- Full pre-event dormant and check-in telemetry — not just the burst
burst_indicatorflags at each step so models can learn temporal dynamics explicitly- A dedicated false-positive class (
Legitimate_High_Risk_Activity) with benign ground truth but fraud-adjacent behavior — the exact class that drives real-world FP rates - Per-record
detection_logicin SQL-like form shows how the scenario would be detected in production - Per-record
anomaly_scoreandlabel_confidenceso models can train on calibration targets, not just hard labels - Cross-asset (crypto + fiat), cross-geography coverage
Typical use cases
- Fraud-detection model training
- AML / transaction-monitoring pipelines
- False-positive-reduction research (reducing customer-experience pain)
- Risk-scoring systems
- Account-takeover detection
- Spoofing / market-manipulation classifiers
- Temporal-burst anomaly detection
- LLM fine-tuning on fraud-investigation narratives
- Benchmarking anomaly scoring against ambiguous ground truth
Quick start
import pandas as pd
import pyarrow.parquet as pq
df = pq.read_table("dark_pool_sample.parquet").to_pandas()
# Label distribution (mix of fraudulent and benign)
print(df["event"].apply(lambda e: e["label"]).value_counts())
# Average financial exposure by fraud class
df["cls"] = df["vulnerability"].apply(lambda v: v["fraud_class"])
df["exposure"] = df["impact"].apply(lambda i: i["financial_exposure_usd"])
print(df.groupby("cls")["exposure"].mean().round(0))
# Burst density by scenario (bursts per sequence)
df["burst_count"] = df["telemetry_stream"].apply(
lambda s: sum(1 for step in s if step["burst_indicator"])
)
print(df.groupby("cls")["burst_count"].mean().round(2))
# False-positive rate signal — proportion of fraudulent-label vs benign per severity
df["severity"] = df["event"].apply(lambda e: e["severity"])
df["label"] = df["event"].apply(lambda e: e["label"])
print(pd.crosstab(df["severity"], df["label"], normalize="index").round(3))
Streaming form:
import json
with open("dark_pool_sample.jsonl") as f:
for line in f:
sequence = json.loads(line)
# one financial activity sequence per line
Responsible use
This dataset is intended for defensive / monitoring use cases: fraud-detection model training, AML research, false-positive reduction, and academic benchmarks. It contains synthesized transaction amounts, synthetic account IDs, and fictional scenario narratives — it does not contain real customer data, real transactions, real wallet addresses, or any PII. Models trained on this data will learn fraud-pattern shape and temporal dynamics; downstream deployment for live transaction monitoring requires calibration against institution-specific real-world data under appropriate compliance review.
License
Released under CC BY 4.0. Use freely for research, fraud-tool prototyping, education, and commercial development with attribution.
Get the full pack
This Hugging Face repo is a 10K-sequence sample. The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, parquet + JSONL + SAR-narrative-aligned delivery, and buyer-specific variants.
Self-serve (Stripe checkout):
- Sample Scale tier — $5,000 — ~25K records, one subject, 72-hour delivery.
Full pack + enterprise scope:
- www.solsticestudio.ai/datasets — per-SKU pricing across Starter / Professional / Enterprise tiers, plus commercial licensing, custom generation, and buyer-specific variants.
Procurement catalog:
- SolsticeAI Data Storefront — available via Datarade / Monda.
Citation
@dataset{solstice_dark_pool_pack_2026,
title = {Aestrea Dark Pool Financial Anomaly Pack (Sample)},
author = {SolsticeAI},
year = {2026},
publisher = {Hugging Face},
url = {https://huggingface.co/datasets/solsticestudioai/dark-pool-pack}
}
- Downloads last month
- 16