Dataset Viewer
Auto-converted to Parquet Duplicate
schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108493", "label": "benign", "label_confidence": 0.623, "severity": "low", "timestamp": "2026-01-06T21:33:00Z", "trace_id": "d640adab-2af9-98cb-233a-9c1da8b247cf" }
{ "account_age_days": 346, "account_id": "ACCT-FAA476D3D385", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.517 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 239, "timestamp": "2026-01-06T15:16:00Z", "transaction_amount_usd": 15.91 }, { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.78, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 1151.86, "financial_exposure_usd": 1548.53, "recoverable_pct": 0.891 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104722", "label": "fraudulent", "label_confidence": 0.828, "severity": "medium", "timestamp": "2026-01-04T06:42:00Z", "trace_id": "9462ffba-7fb2-2728-0261-9771cfd8e821" }
{ "account_age_days": 553, "account_id": "ACCT-F5255FD490EE", "baseline_risk_score": 0.279, "kyc_tier": "tier_1", "session_entropy": 0.632 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 1056, "timestamp": "2026-01-04T06:42:00Z", "transaction_amount_usd": 2632874.55 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.886, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4984361.33, "financial_exposure_usd": 5292518.76, "recoverable_pct": 0.683 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102793", "label": "fraudulent", "label_confidence": 0.936, "severity": "critical", "timestamp": "2026-01-02T22:33:00Z", "trace_id": "16ac154b-4def-0201-bbfe-99c10945b08e" }
{ "account_age_days": 937, "account_id": "ACCT-4BF39254554A", "baseline_risk_score": 0.282, "kyc_tier": "tier_1", "session_entropy": 0.711 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 602, "timestamp": "2026-01-02T22:33:00Z", "transaction_amount_usd": 59509.71 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.574, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 686482.15, "financial_exposure_usd": 791374.25, "recoverable_pct": 0.082 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105209", "label": "fraudulent", "label_confidence": 0.781, "severity": "high", "timestamp": "2026-01-04T14:49:00Z", "trace_id": "98cec11a-dd1d-9dec-15fe-85a6bc469ac1" }
{ "account_age_days": 670, "account_id": "ACCT-AABDF4D08932", "baseline_risk_score": 0.315, "kyc_tier": "tier_1", "session_entropy": 0.269 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 273, "timestamp": "2026-01-04T14:49:00Z", "transaction_amount_usd": 1259308.51 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.625, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3262728.91, "financial_exposure_usd": 4139717.47, "recoverable_pct": 0.752 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105641", "label": "fraudulent", "label_confidence": 0.702, "severity": "medium", "timestamp": "2026-01-04T22:01:00Z", "trace_id": "9cc32b4a-822a-5f1c-40c7-75abe99b88f3" }
{ "account_age_days": 4, "account_id": "ACCT-7C2396732CBE", "baseline_risk_score": 0.105, "kyc_tier": "tier_2", "session_entropy": 0.565 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 572, "timestamp": "2026-01-04T22:01:00Z", "transaction_amount_usd": 2942811.68 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.353, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 5414028.49, "financial_exposure_usd": 5571750.95, "recoverable_pct": 0.836 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106478", "label": "fraudulent", "label_confidence": 0.711, "severity": "high", "timestamp": "2026-01-05T11:58:00Z", "trace_id": "0f65028c-e060-77dd-be76-d0bdc7e0d8d2" }
{ "account_age_days": 271, "account_id": "ACCT-D05E75638124", "baseline_risk_score": 0.414, "kyc_tier": "tier_2", "session_entropy": 0.395 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 970, "timestamp": "2026-01-05T11:58:00Z", "transaction_amount_usd": 2455911.08 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.614, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4552683.61, "financial_exposure_usd": 5294248.42, "recoverable_pct": 0.795 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109387", "label": "benign", "label_confidence": 0.602, "severity": "high", "timestamp": "2026-01-07T12:27:00Z", "trace_id": "c5bf6292-182a-d014-4b2c-b369e5d0bedf" }
{ "account_age_days": 915, "account_id": "ACCT-88C311B09AA0", "baseline_risk_score": 0.093, "kyc_tier": "tier_3", "session_entropy": 0.37 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 95, "timestamp": "2026-01-07T03:48:00Z", "transaction_amount_usd": 12.63 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.791, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2109.19, "financial_exposure_usd": 2711.3, "recoverable_pct": 0.763 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109343", "label": "benign", "label_confidence": 0.638, "severity": "low", "timestamp": "2026-01-07T11:43:00Z", "trace_id": "33064d97-ff24-19df-885b-be9252baa699" }
{ "account_age_days": 1494, "account_id": "ACCT-D98DD0FAE0DC", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.779 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 537, "timestamp": "2026-01-07T11:43:00Z", "transaction_amount_usd": 11041.14 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.578, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 721.29, "financial_exposure_usd": 781.13, "recoverable_pct": 0.988 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104193", "label": "fraudulent", "label_confidence": 0.607, "severity": "low", "timestamp": "2026-01-03T21:53:00Z", "trace_id": "ef0ca128-9d6d-a18d-169e-a7ea73c904ac" }
{ "account_age_days": 1888, "account_id": "ACCT-730F7E3C3E3B", "baseline_risk_score": 0.209, "kyc_tier": "tier_2", "session_entropy": 0.632 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 456, "timestamp": "2026-01-03T21:53:00Z", "transaction_amount_usd": 351276.13 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.827, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1231409.45, "financial_exposure_usd": 2988494.43, "recoverable_pct": 0.71 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108214", "label": "benign", "label_confidence": 0.565, "severity": "low", "timestamp": "2026-01-06T16:54:00Z", "trace_id": "2b3779be-48c4-7d21-2d6c-6606bb301279" }
{ "account_age_days": 1303, "account_id": "ACCT-380B73B1BE8E", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.892 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 350, "timestamp": "2026-01-06T15:12:00Z", "transaction_amount_usd": 24.59 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.784, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 848.18, "financial_exposure_usd": 1119.54, "recoverable_pct": 0.734 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105989", "label": "fraudulent", "label_confidence": 0.864, "severity": "critical", "timestamp": "2026-01-05T03:49:00Z", "trace_id": "3e2ff374-b3bd-eaec-cc39-7510dd506590" }
{ "account_age_days": 1939, "account_id": "ACCT-F33AAF911AC5", "baseline_risk_score": 0.301, "kyc_tier": "tier_3", "session_entropy": 0.658 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 520, "timestamp": "2026-01-05T03:49:00Z", "transaction_amount_usd": 2622727.81 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.492, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 5468458.74, "financial_exposure_usd": 5641369.68, "recoverable_pct": 0.869 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108618", "label": "benign", "label_confidence": 0.548, "severity": "low", "timestamp": "2026-01-06T23:38:00Z", "trace_id": "b798e23c-4bc1-0c76-69cd-7a8e438c0b70" }
{ "account_age_days": 556, "account_id": "ACCT-A88E50D5C602", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.547 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 227, "timestamp": "2026-01-06T18:46:00Z", "transaction_amount_usd": 24.05 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.638, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3670.53, "financial_exposure_usd": 4076.48, "recoverable_pct": 0.866 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108030", "label": "benign", "label_confidence": 0.648, "severity": "high", "timestamp": "2026-01-06T13:50:00Z", "trace_id": "d05d45e9-4f96-524f-ff48-1d3eb5f8dfad" }
{ "account_age_days": 1008, "account_id": "ACCT-089E8ED25925", "baseline_risk_score": 0.174, "kyc_tier": "tier_1", "session_entropy": 0.377 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 524, "timestamp": "2026-01-06T13:50:00Z", "transaction_amount_usd": 3766.27 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.572, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 849.72, "financial_exposure_usd": 1364.93, "recoverable_pct": 0.753 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103007", "label": "fraudulent", "label_confidence": 0.882, "severity": "critical", "timestamp": "2026-01-03T02:07:00Z", "trace_id": "2adcc350-e7ce-fb56-c150-d068a3326656" }
{ "account_age_days": 147, "account_id": "ACCT-A28E8B0320B8", "baseline_risk_score": 0.42, "kyc_tier": "tier_1", "session_entropy": 0.907 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 814, "timestamp": "2026-01-03T02:07:00Z", "transaction_amount_usd": 33166.68 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.729, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 669574.48, "financial_exposure_usd": 1025672.09, "recoverable_pct": 0.732 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100537", "label": "fraudulent", "label_confidence": 0.951, "severity": "critical", "timestamp": "2026-01-01T08:57:00Z", "trace_id": "063c47eb-4110-df55-d8b0-8cf3e2cdd04c" }
{ "account_age_days": 1012, "account_id": "ACCT-316B70DAB9A2", "baseline_risk_score": 0.543, "kyc_tier": "tier_3", "session_entropy": 0.717 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 388, "timestamp": "2026-01-01T00:04:00Z", "transaction_amount_usd": 8.86 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.759, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 8", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 548258.12, "financial_exposure_usd": 826101.33, "recoverable_pct": 0.09 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103070", "label": "fraudulent", "label_confidence": 0.929, "severity": "high", "timestamp": "2026-01-03T03:10:00Z", "trace_id": "e74f9a8f-d8d8-ef10-bc76-ef531d6568b9" }
{ "account_age_days": 1303, "account_id": "ACCT-52240B17DE97", "baseline_risk_score": 0.572, "kyc_tier": "tier_1", "session_entropy": 0.9 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 402, "timestamp": "2026-01-03T03:10:00Z", "transaction_amount_usd": 81079.82 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.847, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 279812.53, "financial_exposure_usd": 513416.37, "recoverable_pct": 0.449 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102567", "label": "fraudulent", "label_confidence": 0.82, "severity": "high", "timestamp": "2026-01-02T18:47:00Z", "trace_id": "390b295c-2863-40af-7d2c-caab1bc6e1a8" }
{ "account_age_days": 1109, "account_id": "ACCT-DE33628C96F3", "baseline_risk_score": 0.611, "kyc_tier": "tier_3", "session_entropy": 0.254 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "SG", "latency_ms": 230, "timestamp": "2026-01-02T18:47:00Z", "transaction_amount_usd": 46118.14 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.832, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 492541.99, "financial_exposure_usd": 1003464.08, "recoverable_pct": 0.658 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105646", "label": "fraudulent", "label_confidence": 0.811, "severity": "medium", "timestamp": "2026-01-04T22:06:00Z", "trace_id": "35c1248f-e17d-825a-322e-e77375d63af2" }
{ "account_age_days": 1825, "account_id": "ACCT-155DB64FE75C", "baseline_risk_score": 0.309, "kyc_tier": "tier_3", "session_entropy": 0.18 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 102, "timestamp": "2026-01-04T22:06:00Z", "transaction_amount_usd": 2023824.68 }, { "asset": "GBP", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.596, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2272362.5, "financial_exposure_usd": 4261999.71, "recoverable_pct": 0.662 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107712", "label": "benign", "label_confidence": 0.503, "severity": "medium", "timestamp": "2026-01-06T08:32:00Z", "trace_id": "a6ce0ce8-2b71-60ed-ea94-03e387cd0990" }
{ "account_age_days": 323, "account_id": "ACCT-6E53FFEB12BD", "baseline_risk_score": 0.186, "kyc_tier": "tier_2", "session_entropy": 0.439 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 192, "timestamp": "2026-01-06T05:50:00Z", "transaction_amount_usd": 2.64 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.465, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 827.29, "financial_exposure_usd": 1403.55, "recoverable_pct": 0.89 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105699", "label": "fraudulent", "label_confidence": 0.879, "severity": "high", "timestamp": "2026-01-04T22:59:00Z", "trace_id": "c3ffaccc-760d-6cf1-b392-c85dddf2b18f" }
{ "account_age_days": 1448, "account_id": "ACCT-7B6FF7279060", "baseline_risk_score": 0.187, "kyc_tier": "tier_3", "session_entropy": 0.897 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 340, "timestamp": "2026-01-04T22:59:00Z", "transaction_amount_usd": 1845149.9 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.721, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 5107861.84, "financial_exposure_usd": 5337262.54, "recoverable_pct": 0.917 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106592", "label": "fraudulent", "label_confidence": 0.925, "severity": "medium", "timestamp": "2026-01-05T13:52:00Z", "trace_id": "d93aaf7b-1a37-1f1f-f182-ed270a3dad48" }
{ "account_age_days": 1266, "account_id": "ACCT-A75934FBE117", "baseline_risk_score": 0.295, "kyc_tier": "tier_1", "session_entropy": 0.897 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NG", "latency_ms": 123, "timestamp": "2026-01-05T13:52:00Z", "transaction_amount_usd": 1542995.34 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.927, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4869878.75, "financial_exposure_usd": 4947958.79, "recoverable_pct": 0.628 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104459", "label": "fraudulent", "label_confidence": 0.65, "severity": "medium", "timestamp": "2026-01-04T02:19:00Z", "trace_id": "214be4da-e4a8-765d-7ef7-5bf7cdd3c974" }
{ "account_age_days": 1026, "account_id": "ACCT-F0E8DC5D1D15", "baseline_risk_score": 0.425, "kyc_tier": "tier_2", "session_entropy": 0.306 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 188, "timestamp": "2026-01-03T21:35:00Z", "transaction_amount_usd": 21.66 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.925, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 1471536.89, "financial_exposure_usd": 2520928.49, "recoverable_pct": 0.64 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109084", "label": "benign", "label_confidence": 0.716, "severity": "medium", "timestamp": "2026-01-07T07:24:00Z", "trace_id": "30d5f999-8022-834b-e18a-0e3ebb0ca23c" }
{ "account_age_days": 1065, "account_id": "ACCT-AFE11C745D81", "baseline_risk_score": 0.197, "kyc_tier": "tier_3", "session_entropy": 0.707 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 371, "timestamp": "2026-01-07T01:12:00Z", "transaction_amount_usd": 8.45 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.565, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1246.72, "financial_exposure_usd": 2839.15, "recoverable_pct": 0.495 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103308", "label": "fraudulent", "label_confidence": 0.966, "severity": "critical", "timestamp": "2026-01-03T07:08:00Z", "trace_id": "42ecc97c-78b5-3908-08ba-e341d31b488b" }
{ "account_age_days": 618, "account_id": "ACCT-502B06B8CABA", "baseline_risk_score": 0.258, "kyc_tier": "tier_3", "session_entropy": 0.166 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 359, "timestamp": "2026-01-03T02:24:00Z", "transaction_amount_usd": 22.26 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.654, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 385062.75, "financial_exposure_usd": 959377.17, "recoverable_pct": 0.582 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109763", "label": "benign", "label_confidence": 0.554, "severity": "low", "timestamp": "2026-01-07T18:43:00Z", "trace_id": "d84aaa3c-3d0f-1a07-5acf-f7fc50cbeac0" }
{ "account_age_days": 403, "account_id": "ACCT-347E962D0E79", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.649 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "LU", "latency_ms": 101, "timestamp": "2026-01-07T06:59:00Z", "transaction_amount_usd": 0.43 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.705, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 487.81, "financial_exposure_usd": 1127.68, "recoverable_pct": 0.908 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100628", "label": "fraudulent", "label_confidence": 0.98, "severity": "critical", "timestamp": "2026-01-01T10:28:00Z", "trace_id": "e1e0815b-7cff-c3db-db37-e876708b042f" }
{ "account_age_days": 454, "account_id": "ACCT-55177750971C", "baseline_risk_score": 0.529, "kyc_tier": "tier_1", "session_entropy": 0.386 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 146, "timestamp": "2026-01-01T09:25:00Z", "transaction_amount_usd": 23.58 }, { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.497, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1117538.8, "financial_exposure_usd": 1337027.4, "recoverable_pct": 0.715 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102897", "label": "fraudulent", "label_confidence": 0.897, "severity": "low", "timestamp": "2026-01-03T00:17:00Z", "trace_id": "7df2d3b7-4080-80f9-54e8-69fc259eaeaf" }
{ "account_age_days": 740, "account_id": "ACCT-66E819E99DB4", "baseline_risk_score": 0.437, "kyc_tier": "tier_3", "session_entropy": 0.338 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 695, "timestamp": "2026-01-03T00:17:00Z", "transaction_amount_usd": 69897.37 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.844, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 584676.77, "financial_exposure_usd": 661055.5, "recoverable_pct": 0.488 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107948", "label": "benign", "label_confidence": 0.585, "severity": "medium", "timestamp": "2026-01-06T12:28:00Z", "trace_id": "15030bc4-bd5c-1e32-e5d4-c4e7199de0d1" }
{ "account_age_days": 1219, "account_id": "ACCT-9D0416212327", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.159 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1138, "timestamp": "2026-01-06T12:28:00Z", "transaction_amount_usd": 10328.9 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.677, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 40.13, "financial_exposure_usd": 96.87, "recoverable_pct": 0.889 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108900", "label": "benign", "label_confidence": 0.586, "severity": "high", "timestamp": "2026-01-07T04:20:00Z", "trace_id": "27785605-7b77-8cef-ad56-cef226d1625b" }
{ "account_age_days": 1824, "account_id": "ACCT-3141E529C152", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.368 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 352, "timestamp": "2026-01-07T04:20:00Z", "transaction_amount_usd": 852.89 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.614, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2890.39, "financial_exposure_usd": 2898.46, "recoverable_pct": 0.91 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105489", "label": "fraudulent", "label_confidence": 0.869, "severity": "high", "timestamp": "2026-01-04T19:29:00Z", "trace_id": "1aeeb9e2-20e3-9ff9-c313-e3f1b4af4e5c" }
{ "account_age_days": 1030, "account_id": "ACCT-B21C192DAE79", "baseline_risk_score": 0.202, "kyc_tier": "tier_3", "session_entropy": 0.605 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 370, "timestamp": "2026-01-04T14:32:00Z", "transaction_amount_usd": 2.89 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.482, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4376540.88, "financial_exposure_usd": 5197986.82, "recoverable_pct": 0.801 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106263", "label": "fraudulent", "label_confidence": 0.603, "severity": "high", "timestamp": "2026-01-05T08:23:00Z", "trace_id": "76c4776c-9322-b15a-eccc-14324d8700e0" }
{ "account_age_days": 680, "account_id": "ACCT-92AD66B62355", "baseline_risk_score": 0.339, "kyc_tier": "tier_3", "session_entropy": 0.646 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 427, "timestamp": "2026-01-05T08:23:00Z", "transaction_amount_usd": 2323723.92 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.699, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1915687.37, "financial_exposure_usd": 4013897.55, "recoverable_pct": 0.466 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104920", "label": "fraudulent", "label_confidence": 0.894, "severity": "high", "timestamp": "2026-01-04T10:00:00Z", "trace_id": "da0e29b2-ff73-da00-6033-b8d293ab1841" }
{ "account_age_days": 527, "account_id": "ACCT-7F9FEDD89614", "baseline_risk_score": 0.116, "kyc_tier": "tier_1", "session_entropy": 0.795 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 119, "timestamp": "2026-01-04T06:50:00Z", "transaction_amount_usd": 7.14 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.693, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3804064.01, "financial_exposure_usd": 6586791.01, "recoverable_pct": 0.903 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105369", "label": "fraudulent", "label_confidence": 0.852, "severity": "high", "timestamp": "2026-01-04T17:29:00Z", "trace_id": "6dd3efb2-fe21-cbcc-2faf-000afa77aff3" }
{ "account_age_days": 1645, "account_id": "ACCT-C419769D441E", "baseline_risk_score": 0.309, "kyc_tier": "tier_2", "session_entropy": 0.111 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 191, "timestamp": "2026-01-04T17:29:00Z", "transaction_amount_usd": 281868.87 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.522, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3720690.1, "financial_exposure_usd": 3948096.87, "recoverable_pct": 0.841 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108032", "label": "benign", "label_confidence": 0.52, "severity": "low", "timestamp": "2026-01-06T13:52:00Z", "trace_id": "a41f6919-4b5f-43b5-bc3d-54ee5f985733" }
{ "account_age_days": 399, "account_id": "ACCT-F5D322FBB510", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.747 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 260, "timestamp": "2026-01-06T08:37:00Z", "transaction_amount_usd": 7.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.722, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2355.61, "financial_exposure_usd": 4854, "recoverable_pct": 0.606 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100095", "label": "fraudulent", "label_confidence": 0.903, "severity": "medium", "timestamp": "2026-01-01T01:35:00Z", "trace_id": "ee854c72-8a9b-7b20-aeb1-fcd3f8360a87" }
{ "account_age_days": 2000, "account_id": "ACCT-5F775A7A25DF", "baseline_risk_score": 0.533, "kyc_tier": "tier_1", "session_entropy": 0.481 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "US", "latency_ms": 208, "timestamp": "2026-01-01T01:35:00Z", "transaction_amount_usd": 50705.53 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.531, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 465578.93, "financial_exposure_usd": 724368.82, "recoverable_pct": 0.425 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103621", "label": "fraudulent", "label_confidence": 0.924, "severity": "medium", "timestamp": "2026-01-03T12:21:00Z", "trace_id": "8429539a-f6e0-f078-953d-41f27f103f8e" }
{ "account_age_days": 1572, "account_id": "ACCT-AA9F50745A4B", "baseline_risk_score": 0.112, "kyc_tier": "tier_3", "session_entropy": 0.817 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 99, "timestamp": "2026-01-03T12:21:00Z", "transaction_amount_usd": 920878 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK_IMBA...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.537, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 1328088.2, "financial_exposure_usd": 3315531.09, "recoverable_pct": 0.974 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107859", "label": "benign", "label_confidence": 0.548, "severity": "critical", "timestamp": "2026-01-06T10:59:00Z", "trace_id": "f9b360e4-baa4-ef78-4622-5563287a15b8" }
{ "account_age_days": 239, "account_id": "ACCT-AFE9E96336E0", "baseline_risk_score": 0.124, "kyc_tier": "tier_1", "session_entropy": 0.231 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 406, "timestamp": "2026-01-06T10:59:00Z", "transaction_amount_usd": 6975.42 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.574, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 439.87, "financial_exposure_usd": 1052.39, "recoverable_pct": 0.688 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107390", "label": "benign", "label_confidence": 0.458, "severity": "medium", "timestamp": "2026-01-06T03:10:00Z", "trace_id": "436db3b6-8677-cc9c-b744-559cdd6260ae" }
{ "account_age_days": 1111, "account_id": "ACCT-6DD04BEC7422", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.7 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 167, "timestamp": "2026-01-06T03:10:00Z", "transaction_amount_usd": 7821.42 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.545, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1883.71, "financial_exposure_usd": 4337.51, "recoverable_pct": 0.8 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103102", "label": "fraudulent", "label_confidence": 0.948, "severity": "medium", "timestamp": "2026-01-03T03:42:00Z", "trace_id": "d7648674-64d6-568d-1a56-63ce2b0e3b4f" }
{ "account_age_days": 1538, "account_id": "ACCT-A5B8A1996D70", "baseline_risk_score": 0.635, "kyc_tier": "tier_2", "session_entropy": 0.697 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 348, "timestamp": "2026-01-03T03:42:00Z", "transaction_amount_usd": 91326.77 }, { "asset": "USDT", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.638, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 507296.27, "financial_exposure_usd": 614740.84, "recoverable_pct": 0.839 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105384", "label": "fraudulent", "label_confidence": 0.688, "severity": "medium", "timestamp": "2026-01-04T17:44:00Z", "trace_id": "d03f7d95-de84-3f3a-ca70-a49e4b2ff7a7" }
{ "account_age_days": 295, "account_id": "ACCT-40317802E2CD", "baseline_risk_score": 0.388, "kyc_tier": "tier_2", "session_entropy": 0.175 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 163, "timestamp": "2026-01-04T05:47:00Z", "transaction_amount_usd": 12.07 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.419, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 640946.79, "financial_exposure_usd": 1197121.81, "recoverable_pct": 0.487 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105335", "label": "fraudulent", "label_confidence": 0.654, "severity": "medium", "timestamp": "2026-01-04T16:55:00Z", "trace_id": "1ec9bae0-d901-9599-aa67-4a9cda3d1c85" }
{ "account_age_days": 759, "account_id": "ACCT-74FE884D1BE3", "baseline_risk_score": 0.301, "kyc_tier": "tier_3", "session_entropy": 0.669 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 409, "timestamp": "2026-01-04T16:55:00Z", "transaction_amount_usd": 2375515.88 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.609, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1285990.33, "financial_exposure_usd": 2061772.49, "recoverable_pct": 0.488 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107324", "label": "benign", "label_confidence": 0.747, "severity": "high", "timestamp": "2026-01-06T02:04:00Z", "trace_id": "69ebc5d7-381f-3c8b-f5a0-69a4c0c1b766" }
{ "account_age_days": 1808, "account_id": "ACCT-BAE0586C28A4", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.443 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 774, "timestamp": "2026-01-06T02:04:00Z", "transaction_amount_usd": 4177.61 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.677, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 4493.61, "financial_exposure_usd": 4854.43, "recoverable_pct": 0.949 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100509", "label": "fraudulent", "label_confidence": 0.885, "severity": "medium", "timestamp": "2026-01-01T08:29:00Z", "trace_id": "c1b2a715-81fe-7fe9-0fdf-6e69dbda8188" }
{ "account_age_days": 925, "account_id": "ACCT-EE1CF2D207A5", "baseline_risk_score": 0.382, "kyc_tier": "tier_2", "session_entropy": 0.243 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 1005, "timestamp": "2026-01-01T08:29:00Z", "transaction_amount_usd": 53873.09 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.508, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 497547.94, "financial_exposure_usd": 795615.3, "recoverable_pct": 0.105 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109025", "label": "benign", "label_confidence": 0.456, "severity": "medium", "timestamp": "2026-01-07T06:25:00Z", "trace_id": "163e7a52-fe9c-7949-c5dc-16f3c12a8076" }
{ "account_age_days": 1922, "account_id": "ACCT-A43B359854A7", "baseline_risk_score": 0.095, "kyc_tier": "tier_2", "session_entropy": 0.213 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 663, "timestamp": "2026-01-07T06:25:00Z", "transaction_amount_usd": 2155.16 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.671, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3670.71, "financial_exposure_usd": 3962.31, "recoverable_pct": 0.42 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107397", "label": "benign", "label_confidence": 0.566, "severity": "critical", "timestamp": "2026-01-06T03:17:00Z", "trace_id": "b8b6d794-9f44-6e53-eb42-3ee5e58b8365" }
{ "account_age_days": 967, "account_id": "ACCT-9D1886750677", "baseline_risk_score": 0.107, "kyc_tier": "tier_3", "session_entropy": 0.916 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 751, "timestamp": "2026-01-06T03:17:00Z", "transaction_amount_usd": 3698.89 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.581, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2466.64, "financial_exposure_usd": 2696.01, "recoverable_pct": 0.523 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101148", "label": "fraudulent", "label_confidence": 0.836, "severity": "critical", "timestamp": "2026-01-01T19:08:00Z", "trace_id": "23dae76c-6836-8d4f-1478-be9be35c05aa" }
{ "account_age_days": 1965, "account_id": "ACCT-7F791DF505E8", "baseline_risk_score": 0.368, "kyc_tier": "tier_3", "session_entropy": 0.503 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 645, "timestamp": "2026-01-01T19:08:00Z", "transaction_amount_usd": 17888.26 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.679, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 1028206.05, "financial_exposure_usd": 1102023.44, "recoverable_pct": 0.201 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109674", "label": "benign", "label_confidence": 0.552, "severity": "low", "timestamp": "2026-01-07T17:14:00Z", "trace_id": "6a119713-17ef-dcd8-6ce9-11956e61abca" }
{ "account_age_days": 1630, "account_id": "ACCT-97966AB9F502", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.385 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 334, "timestamp": "2026-01-07T17:14:00Z", "transaction_amount_usd": 12673.33 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.64, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr...
{ "customer_funds_at_risk_usd": 599.76, "financial_exposure_usd": 1236.29, "recoverable_pct": 0.709 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101521", "label": "fraudulent", "label_confidence": 0.953, "severity": "medium", "timestamp": "2026-01-02T01:21:00Z", "trace_id": "777c1295-0e24-3eaf-a32e-f57e358e2fbb" }
{ "account_age_days": 193, "account_id": "ACCT-373C1CB4B4C5", "baseline_risk_score": 0.458, "kyc_tier": "tier_2", "session_entropy": 0.478 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 298, "timestamp": "2026-01-01T18:41:00Z", "transaction_amount_usd": 1.42 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.823, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 232045.41, "financial_exposure_usd": 562091.52, "recoverable_pct": 0.514 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107539", "label": "benign", "label_confidence": 0.648, "severity": "low", "timestamp": "2026-01-06T05:39:00Z", "trace_id": "f02dafe8-19ec-be4d-68c3-3018d672b3ad" }
{ "account_age_days": 257, "account_id": "ACCT-CB699AB0FFEE", "baseline_risk_score": 0.093, "kyc_tier": "tier_1", "session_entropy": 0.893 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 94, "timestamp": "2026-01-05T21:12:00Z", "transaction_amount_usd": 20.63 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.503, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 7910.26, "financial_exposure_usd": 8858.39, "recoverable_pct": 0.991 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100409", "label": "fraudulent", "label_confidence": 0.867, "severity": "high", "timestamp": "2026-01-01T06:49:00Z", "trace_id": "a11244cb-1243-a7d7-ca22-46d5fe22a8c3" }
{ "account_age_days": 479, "account_id": "ACCT-BD1EB06FBF49", "baseline_risk_score": 0.353, "kyc_tier": "tier_1", "session_entropy": 0.711 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "LU", "latency_ms": 913, "timestamp": "2026-01-01T06:49:00Z", "transaction_amount_usd": 30299.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.393, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 759197.76, "financial_exposure_usd": 1466465.74, "recoverable_pct": 0.315 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103978", "label": "fraudulent", "label_confidence": 0.686, "severity": "low", "timestamp": "2026-01-03T18:18:00Z", "trace_id": "7245d6c9-9960-1e15-9a7b-7a0248b72030" }
{ "account_age_days": 1752, "account_id": "ACCT-2056E012945E", "baseline_risk_score": 0.188, "kyc_tier": "tier_2", "session_entropy": 0.37 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 552, "timestamp": "2026-01-03T18:18:00Z", "transaction_amount_usd": 1695935.22 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.517, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1461744.86, "financial_exposure_usd": 3205672.63, "recoverable_pct": 0.638 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108024", "label": "benign", "label_confidence": 0.701, "severity": "low", "timestamp": "2026-01-06T13:44:00Z", "trace_id": "47546d65-70f1-911d-6657-13a11bd35dac" }
{ "account_age_days": 542, "account_id": "ACCT-22F7513B3A2A", "baseline_risk_score": 0.113, "kyc_tier": "tier_1", "session_entropy": 0.659 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 340, "timestamp": "2026-01-06T13:44:00Z", "transaction_amount_usd": 2672.82 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.547, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 44.18, "financial_exposure_usd": 50.12, "recoverable_pct": 0.518 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107985", "label": "benign", "label_confidence": 0.638, "severity": "medium", "timestamp": "2026-01-06T13:05:00Z", "trace_id": "df245259-4265-aa4d-1d7e-ae46bf714395" }
{ "account_age_days": 1579, "account_id": "ACCT-1650714C1F70", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.636 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 767, "timestamp": "2026-01-06T13:05:00Z", "transaction_amount_usd": 2563.78 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.63, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior...
{ "customer_funds_at_risk_usd": 7613.5, "financial_exposure_usd": 10175.24, "recoverable_pct": 0.898 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108587", "label": "benign", "label_confidence": 0.649, "severity": "high", "timestamp": "2026-01-06T23:07:00Z", "trace_id": "f75b934a-9661-0fa4-3418-3e8681b3fb8b" }
{ "account_age_days": 1311, "account_id": "ACCT-7F7C28D32F32", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.672 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "MY", "latency_ms": 294, "timestamp": "2026-01-06T15:16:00Z", "transaction_amount_usd": 22.48 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.684, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 6297.44, "financial_exposure_usd": 6644.81, "recoverable_pct": 0.792 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107871", "label": "benign", "label_confidence": 0.513, "severity": "low", "timestamp": "2026-01-06T11:11:00Z", "trace_id": "c9f946ff-0524-1b59-e972-b8f963da50d4" }
{ "account_age_days": 1964, "account_id": "ACCT-868D5E8EBFAF", "baseline_risk_score": 0.133, "kyc_tier": "tier_3", "session_entropy": 0.384 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 231, "timestamp": "2026-01-06T11:11:00Z", "transaction_amount_usd": 5620.71 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.552, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1386.22, "financial_exposure_usd": 1640.56, "recoverable_pct": 0.876 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108825", "label": "benign", "label_confidence": 0.532, "severity": "medium", "timestamp": "2026-01-07T03:05:00Z", "trace_id": "fb376fb6-5e99-40b9-a174-550e030f4882" }
{ "account_age_days": 643, "account_id": "ACCT-E202E693FF14", "baseline_risk_score": 0.113, "kyc_tier": "tier_2", "session_entropy": 0.223 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 339, "timestamp": "2026-01-07T03:05:00Z", "transaction_amount_usd": 1028.74 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.455, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1730.22, "financial_exposure_usd": 3544.57, "recoverable_pct": 0.616 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106861", "label": "benign", "label_confidence": 0.693, "severity": "medium", "timestamp": "2026-01-05T18:21:00Z", "trace_id": "1f840ecc-7ab9-b680-c53c-89b162684ed8" }
{ "account_age_days": 316, "account_id": "ACCT-E24F712F0237", "baseline_risk_score": 0.177, "kyc_tier": "tier_1", "session_entropy": 0.293 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 377, "timestamp": "2026-01-05T12:13:00Z", "transaction_amount_usd": 10.85 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.571, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1900.84, "financial_exposure_usd": 3701.82, "recoverable_pct": 0.603 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101138", "label": "fraudulent", "label_confidence": 0.803, "severity": "critical", "timestamp": "2026-01-01T18:58:00Z", "trace_id": "f8e65bff-c0eb-c0dc-77d9-1e61b2f15b4d" }
{ "account_age_days": 1598, "account_id": "ACCT-846E32BEBC3B", "baseline_risk_score": 0.354, "kyc_tier": "tier_1", "session_entropy": 0.649 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 155, "timestamp": "2026-01-01T18:58:00Z", "transaction_amount_usd": 14287.51 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.57, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ...
{ "customer_funds_at_risk_usd": 498812.7, "financial_exposure_usd": 914712.36, "recoverable_pct": 0.757 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107179", "label": "benign", "label_confidence": 0.471, "severity": "medium", "timestamp": "2026-01-05T23:39:00Z", "trace_id": "8d86a22f-e559-600d-10b3-9a18e9ecc6c4" }
{ "account_age_days": 314, "account_id": "ACCT-0AE6FF53E51D", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.872 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 228, "timestamp": "2026-01-05T23:39:00Z", "transaction_amount_usd": 11427.46 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.682, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 4042.42, "financial_exposure_usd": 4444.57, "recoverable_pct": 0.88 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107633", "label": "benign", "label_confidence": 0.633, "severity": "high", "timestamp": "2026-01-06T07:13:00Z", "trace_id": "725c4bb0-9b02-e588-a15c-517cabb13a97" }
{ "account_age_days": 1690, "account_id": "ACCT-4C03BEA9425B", "baseline_risk_score": 0.1, "kyc_tier": "tier_2", "session_entropy": 0.389 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 776, "timestamp": "2026-01-06T07:13:00Z", "transaction_amount_usd": 10851.88 }, { "asset": "ETH", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.706, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3436.09, "financial_exposure_usd": 4459.03, "recoverable_pct": 0.927 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108037", "label": "benign", "label_confidence": 0.637, "severity": "low", "timestamp": "2026-01-06T13:57:00Z", "trace_id": "6722fe02-d427-6c9d-bcb1-7a8f32a7b8f8" }
{ "account_age_days": 844, "account_id": "ACCT-F3A6F83EA36C", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.434 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "GR", "latency_ms": 456, "timestamp": "2026-01-06T13:57:00Z", "transaction_amount_usd": 9352.56 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.655, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 4465.47, "financial_exposure_usd": 4760.28, "recoverable_pct": 0.706 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101506", "label": "fraudulent", "label_confidence": 0.807, "severity": "critical", "timestamp": "2026-01-02T01:06:00Z", "trace_id": "84026727-5cb1-c234-f881-8101cf96ad0f" }
{ "account_age_days": 1969, "account_id": "ACCT-A1D2872DD0E5", "baseline_risk_score": 0.566, "kyc_tier": "tier_3", "session_entropy": 0.566 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 305, "timestamp": "2026-01-02T01:06:00Z", "transaction_amount_usd": 88175.87 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.611, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 410380.9, "financial_exposure_usd": 598186.01, "recoverable_pct": 0.802 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106636", "label": "fraudulent", "label_confidence": 0.948, "severity": "critical", "timestamp": "2026-01-05T14:36:00Z", "trace_id": "03ebe467-e121-de6b-2532-04b071e0d18f" }
{ "account_age_days": 987, "account_id": "ACCT-7B8FFF222279", "baseline_risk_score": 0.177, "kyc_tier": "tier_1", "session_entropy": 0.499 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 337, "timestamp": "2026-01-05T14:36:00Z", "transaction_amount_usd": 585261.33 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.889, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1928878.98, "financial_exposure_usd": 2896843.85, "recoverable_pct": 0.802 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105484", "label": "fraudulent", "label_confidence": 0.698, "severity": "low", "timestamp": "2026-01-04T19:24:00Z", "trace_id": "bfdfaa91-a125-e481-0232-247597178a37" }
{ "account_age_days": 1971, "account_id": "ACCT-CCA36D28AE0D", "baseline_risk_score": 0.19, "kyc_tier": "tier_1", "session_entropy": 0.536 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "SG", "latency_ms": 807, "timestamp": "2026-01-04T19:24:00Z", "transaction_amount_usd": 1908089.55 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.443, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4290905.1, "financial_exposure_usd": 4755224.83, "recoverable_pct": 0.912 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103488", "label": "fraudulent", "label_confidence": 0.673, "severity": "medium", "timestamp": "2026-01-03T10:08:00Z", "trace_id": "40c98a20-6016-8443-a842-56e0cd54f12e" }
{ "account_age_days": 232, "account_id": "ACCT-D1421BF3BD33", "baseline_risk_score": 0.34, "kyc_tier": "tier_3", "session_entropy": 0.518 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 352, "timestamp": "2026-01-03T05:27:00Z", "transaction_amount_usd": 3.36 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.715, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3138067.87, "financial_exposure_usd": 4342449.33, "recoverable_pct": 0.562 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102070", "label": "fraudulent", "label_confidence": 0.821, "severity": "low", "timestamp": "2026-01-02T10:30:00Z", "trace_id": "93bbf083-29b1-9b2c-d338-4d012b487d4f" }
{ "account_age_days": 1491, "account_id": "ACCT-CF092CA68CC0", "baseline_risk_score": 0.394, "kyc_tier": "tier_2", "session_entropy": 0.494 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 691, "timestamp": "2026-01-02T10:30:00Z", "transaction_amount_usd": 89189.97 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.898, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 1252858.21, "financial_exposure_usd": 1271585.34, "recoverable_pct": 0.304 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107467", "label": "benign", "label_confidence": 0.631, "severity": "low", "timestamp": "2026-01-06T04:27:00Z", "trace_id": "ce42821d-d41c-1e31-df24-be152e3a1a1c" }
{ "account_age_days": 1192, "account_id": "ACCT-317D0CB6D7B2", "baseline_risk_score": 0.151, "kyc_tier": "tier_3", "session_entropy": 0.369 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 825, "timestamp": "2026-01-06T04:27:00Z", "transaction_amount_usd": 667.89 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.569, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2107.16, "financial_exposure_usd": 2139.54, "recoverable_pct": 0.912 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104729", "label": "fraudulent", "label_confidence": 0.644, "severity": "critical", "timestamp": "2026-01-04T06:49:00Z", "trace_id": "e6a25191-9969-f3b5-a466-7ffbd01cb7c7" }
{ "account_age_days": 495, "account_id": "ACCT-4EC508DC603B", "baseline_risk_score": 0.196, "kyc_tier": "tier_3", "session_entropy": 0.65 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "RU", "latency_ms": 368, "timestamp": "2026-01-04T06:49:00Z", "transaction_amount_usd": 1100022.74 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.651, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4154806.52, "financial_exposure_usd": 7497638.3, "recoverable_pct": 0.956 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101988", "label": "fraudulent", "label_confidence": 0.906, "severity": "low", "timestamp": "2026-01-02T09:08:00Z", "trace_id": "35a7d7d2-09a1-4b60-7b16-4079624190b5" }
{ "account_age_days": 1578, "account_id": "ACCT-1E8EC933C502", "baseline_risk_score": 0.367, "kyc_tier": "tier_2", "session_entropy": 0.801 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 402, "timestamp": "2026-01-02T09:08:00Z", "transaction_amount_usd": 109937.37 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.872, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 795397.83, "financial_exposure_usd": 1146518.72, "recoverable_pct": 0.357 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107136", "label": "benign", "label_confidence": 0.631, "severity": "high", "timestamp": "2026-01-05T22:56:00Z", "trace_id": "33d71322-7b92-56a4-9cbc-8ae9e42f0c66" }
{ "account_age_days": 786, "account_id": "ACCT-F7907C6BBB0D", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.727 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 1190, "timestamp": "2026-01-05T22:56:00Z", "transaction_amount_usd": 8930.85 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.545, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1285.74, "financial_exposure_usd": 2266.67, "recoverable_pct": 0.818 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103918", "label": "fraudulent", "label_confidence": 0.803, "severity": "high", "timestamp": "2026-01-03T17:18:00Z", "trace_id": "22abda02-b43c-5419-8403-2d21acd3fa54" }
{ "account_age_days": 98, "account_id": "ACCT-63932EEEB5C4", "baseline_risk_score": 0.255, "kyc_tier": "tier_3", "session_entropy": 0.532 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 1167, "timestamp": "2026-01-03T17:18:00Z", "transaction_amount_usd": 1579099.39 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.439, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3094101.72, "financial_exposure_usd": 4754333.34, "recoverable_pct": 0.596 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104376", "label": "fraudulent", "label_confidence": 0.94, "severity": "medium", "timestamp": "2026-01-04T00:56:00Z", "trace_id": "70e72d39-02cd-5c3d-f2a2-2cd025976323" }
{ "account_age_days": 946, "account_id": "ACCT-D794081A00D3", "baseline_risk_score": 0.437, "kyc_tier": "tier_3", "session_entropy": 0.778 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 350, "timestamp": "2026-01-04T00:56:00Z", "transaction_amount_usd": 2453986.66 }, { "asset": "JPY", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.622, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4994819.08, "financial_exposure_usd": 5369604.31, "recoverable_pct": 0.55 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105542", "label": "fraudulent", "label_confidence": 0.778, "severity": "low", "timestamp": "2026-01-04T20:22:00Z", "trace_id": "3e4c762d-c672-213a-1032-7e5ff298af82" }
{ "account_age_days": 1844, "account_id": "ACCT-6E4F39001BEC", "baseline_risk_score": 0.328, "kyc_tier": "tier_2", "session_entropy": 0.469 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 911, "timestamp": "2026-01-04T20:22:00Z", "transaction_amount_usd": 2273430.62 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.767, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4603931.17, "financial_exposure_usd": 5775951.87, "recoverable_pct": 0.993 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101357", "label": "fraudulent", "label_confidence": 0.839, "severity": "low", "timestamp": "2026-01-01T22:37:00Z", "trace_id": "9aaedfac-c2c2-598d-a1be-e969f768443b" }
{ "account_age_days": 993, "account_id": "ACCT-7D9CF4DC70AF", "baseline_risk_score": 0.439, "kyc_tier": "tier_2", "session_entropy": 0.171 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 940, "timestamp": "2026-01-01T22:37:00Z", "transaction_amount_usd": 114057.18 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.913, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 287253.95, "financial_exposure_usd": 684548.94, "recoverable_pct": 0.575 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107513", "label": "benign", "label_confidence": 0.591, "severity": "medium", "timestamp": "2026-01-06T05:13:00Z", "trace_id": "0a8db0d9-ff3d-59c9-ad2b-bf40b0d0522e" }
{ "account_age_days": 1073, "account_id": "ACCT-39F54E58E9EA", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.574 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 272, "timestamp": "2026-01-06T05:13:00Z", "transaction_amount_usd": 8104.52 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.784, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 989.87, "financial_exposure_usd": 1473.7, "recoverable_pct": 0.491 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106448", "label": "fraudulent", "label_confidence": 0.74, "severity": "low", "timestamp": "2026-01-05T11:28:00Z", "trace_id": "47a96162-0ea7-29c9-4f7b-e92c609bfcd1" }
{ "account_age_days": 966, "account_id": "ACCT-C6818C6445AD", "baseline_risk_score": 0.298, "kyc_tier": "tier_3", "session_entropy": 0.28 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 249, "timestamp": "2026-01-05T04:45:00Z", "transaction_amount_usd": 15.29 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.785, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 6825203.32, "financial_exposure_usd": 8125466.25, "recoverable_pct": 0.894 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101971", "label": "fraudulent", "label_confidence": 0.914, "severity": "critical", "timestamp": "2026-01-02T08:51:00Z", "trace_id": "91fb71f3-01fa-dbaa-7f4f-c415276785ab" }
{ "account_age_days": 1232, "account_id": "ACCT-9CBD2CEA32E9", "baseline_risk_score": 0.429, "kyc_tier": "tier_3", "session_entropy": 0.357 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 1121, "timestamp": "2026-01-02T08:51:00Z", "transaction_amount_usd": 73701.15 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.772, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 717381.07, "financial_exposure_usd": 854947.18, "recoverable_pct": 0.51 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108583", "label": "benign", "label_confidence": 0.523, "severity": "low", "timestamp": "2026-01-06T23:03:00Z", "trace_id": "d4822ffa-3e34-f7d8-276b-88545c367272" }
{ "account_age_days": 1940, "account_id": "ACCT-A535A6DFFB83", "baseline_risk_score": 0.062, "kyc_tier": "tier_2", "session_entropy": 0.576 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 818, "timestamp": "2026-01-06T23:03:00Z", "transaction_amount_usd": 2695.85 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.788, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 5533.57, "financial_exposure_usd": 6832.44, "recoverable_pct": 0.779 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
End of preview. Expand in Data Studio

Aestrea Dark Pool Financial Anomaly Pack (Sample)

A synthetic financial-anomaly and fraud-detection dataset for AML / transaction-monitoring model training, false-positive reduction research, and fintech anomaly-detection pipelines. Each row is a complete financial activity sequence — a dormant warm-up period followed by a sudden activity burst — labeled as account takeover, market-manipulation spoofing, or legitimate-but-high-risk (false positive) behavior, with telemetry, identity context, detection logic, and financial exposure.

Built by SolsticeAI as a free sample of a larger commercial pack. 100% synthetic. No real transactions, accounts, addresses, order books, or customer data.

What is included

File Rows Format Purpose
dark_pool_sample.parquet 10,000 Parquet Columnar, typed, best for analytics
dark_pool_sample.jsonl 10,000 JSON Lines Streaming / LLM training friendly

This sample: 10,000 financial activity sequences, stratified 3,333 per fraud class.
Fraud classes (3): Account_Takeover_Sequence, Market_Manipulation_Spoofing, Legitimate_High_Risk_Activity (false positive)
Label distribution: ~6,666 fraudulent / ~3,334 benign (by design — one of three scenarios is a benign high-risk lookalike)
Severity tiers: low, medium, high, critical — scenario-weighted so spoofing skews mid, ATO skews high, false-positives skew low
Assets covered: BTC, ETH, USDC, USDT, SOL, USD, EUR, GBP, JPY
Geographic coverage: 20 country codes across high-risk and low-risk jurisdictions

Record structure

Each record is one financial activity sequence with 7 top-level fields:

Field Type Contents
schema_version string Pack schema version (1.0.0-dark-pool-sample)
event struct id, trace_id, timestamp, severity, label, label_confidence
identity_context struct account_id, baseline_risk_score, session_entropy, account_age_days, kyc_tier
telemetry_stream list Ordered financial events: timestamp, event_name (e.g., LARGE_WITHDRAWAL, LIMIT_ORDER_CANCELLED, LOGIN_NEW_COUNTRY), asset, transaction_amount_usd, geo_country, latency_ms, burst_indicator
vulnerability struct fraud_class, scenario_description, exposure_vector
detection struct anomaly_type, baseline_deviation, detection_logic (SQL-like), anomaly_score, confidence_band
impact struct financial_exposure_usd, customer_funds_at_risk_usd, recoverable_pct
simulation struct synthetic, engine, chaos_profile, ground_truth_classification

See SCHEMA.md for the full nested field breakdown.

Why this dataset is useful

Most public financial-fraud datasets are either flat tabular snapshots (IEEE-CIS, credit-card fraud) or narrow single-event labels. Real AML / transaction-monitoring models need something these don't provide: sequences (warm-up → burst), ambiguous labels (legitimate-but-high-risk that looks like fraud), and detection logic grounded in behavioral patterns rather than just feature engineering.

  • Full pre-event dormant and check-in telemetry — not just the burst
  • burst_indicator flags at each step so models can learn temporal dynamics explicitly
  • A dedicated false-positive class (Legitimate_High_Risk_Activity) with benign ground truth but fraud-adjacent behavior — the exact class that drives real-world FP rates
  • Per-record detection_logic in SQL-like form shows how the scenario would be detected in production
  • Per-record anomaly_score and label_confidence so models can train on calibration targets, not just hard labels
  • Cross-asset (crypto + fiat), cross-geography coverage

Typical use cases

  • Fraud-detection model training
  • AML / transaction-monitoring pipelines
  • False-positive-reduction research (reducing customer-experience pain)
  • Risk-scoring systems
  • Account-takeover detection
  • Spoofing / market-manipulation classifiers
  • Temporal-burst anomaly detection
  • LLM fine-tuning on fraud-investigation narratives
  • Benchmarking anomaly scoring against ambiguous ground truth

Quick start

import pandas as pd
import pyarrow.parquet as pq

df = pq.read_table("dark_pool_sample.parquet").to_pandas()

# Label distribution (mix of fraudulent and benign)
print(df["event"].apply(lambda e: e["label"]).value_counts())

# Average financial exposure by fraud class
df["cls"] = df["vulnerability"].apply(lambda v: v["fraud_class"])
df["exposure"] = df["impact"].apply(lambda i: i["financial_exposure_usd"])
print(df.groupby("cls")["exposure"].mean().round(0))

# Burst density by scenario (bursts per sequence)
df["burst_count"] = df["telemetry_stream"].apply(
    lambda s: sum(1 for step in s if step["burst_indicator"])
)
print(df.groupby("cls")["burst_count"].mean().round(2))

# False-positive rate signal — proportion of fraudulent-label vs benign per severity
df["severity"] = df["event"].apply(lambda e: e["severity"])
df["label"] = df["event"].apply(lambda e: e["label"])
print(pd.crosstab(df["severity"], df["label"], normalize="index").round(3))

Streaming form:

import json

with open("dark_pool_sample.jsonl") as f:
    for line in f:
        sequence = json.loads(line)
        # one financial activity sequence per line

Responsible use

This dataset is intended for defensive / monitoring use cases: fraud-detection model training, AML research, false-positive reduction, and academic benchmarks. It contains synthesized transaction amounts, synthetic account IDs, and fictional scenario narratives — it does not contain real customer data, real transactions, real wallet addresses, or any PII. Models trained on this data will learn fraud-pattern shape and temporal dynamics; downstream deployment for live transaction monitoring requires calibration against institution-specific real-world data under appropriate compliance review.

License

Released under CC BY 4.0. Use freely for research, fraud-tool prototyping, education, and commercial development with attribution.

Get the full pack

This Hugging Face repo is a 10K-sequence sample. The production pack scales to 5M+ sequences with expanded scenario coverage (layering, smurfing, wash trading, sanctions-evasion routing, trade-based ML, bust-out fraud), additional asset classes (equities, FX, derivatives, NFTs), multi-entity transaction graphs, richer ambiguous-label distribution tuning, parquet + JSONL + SAR-narrative-aligned delivery, and buyer-specific variants.

Self-serve (Stripe checkout):

Full pack + enterprise scope:

  • www.solsticestudio.ai/datasets — per-SKU pricing across Starter / Professional / Enterprise tiers, plus commercial licensing, custom generation, and buyer-specific variants.

Procurement catalog:

Citation

@dataset{solstice_dark_pool_pack_2026,
  title        = {Aestrea Dark Pool Financial Anomaly Pack (Sample)},
  author       = {SolsticeAI},
  year         = {2026},
  publisher    = {Hugging Face},
  url          = {https://huggingface.co/datasets/solsticestudioai/dark-pool-pack}
}
Downloads last month
16