schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101102",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "low",
"timestamp": "2026-01-01T18:22:00Z",
"trace_id": "bfe7b612-1bcd-73ac-e2e2-3b9ca713b505"
} | {
"account_age_days": 1865,
"account_id": "ACCT-D6F898F907D9",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_3",
"session_entropy": 0.731
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 463,
"timestamp": "2026-01-01T18:22:00Z",
"transaction_amount_usd": 63715.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.358,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 835429.37,
"financial_exposure_usd": 1282269.41,
"recoverable_pct": 0.324
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109601",
"label": "benign",
"label_confidence": 0.664,
"severity": "low",
"timestamp": "2026-01-07T16:01:00Z",
"trace_id": "7f545ec2-b45d-f45a-26cb-00a3ea3ceade"
} | {
"account_age_days": 1795,
"account_id": "ACCT-CA84E183E994",
"baseline_risk_score": 0.17,
"kyc_tier": "tier_1",
"session_entropy": 0.635
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 966,
"timestamp": "2026-01-07T16:01:00Z",
"transaction_amount_usd": 14376.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 709.47,
"financial_exposure_usd": 1350.21,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108763",
"label": "benign",
"label_confidence": 0.706,
"severity": "high",
"timestamp": "2026-01-07T02:03:00Z",
"trace_id": "4f1f40da-ebea-feb8-aa43-f16970d9ef96"
} | {
"account_age_days": 1923,
"account_id": "ACCT-B6BE9053419A",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_1",
"session_entropy": 0.696
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 978,
"timestamp": "2026-01-07T02:03:00Z",
"transaction_amount_usd": 13680.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 2",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1666.08,
"financial_exposure_usd": 2353.41,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104182",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "critical",
"timestamp": "2026-01-03T21:42:00Z",
"trace_id": "ef804b92-7f88-6d63-626a-c840a60e0fd6"
} | {
"account_age_days": 278,
"account_id": "ACCT-8FA7DF48AECA",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_3",
"session_entropy": 0.323
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 464,
"timestamp": "2026-01-03T21:42:00Z",
"transaction_amount_usd": 585649.2
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3380434.83,
"financial_exposure_usd": 5236231.26,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104175",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "critical",
"timestamp": "2026-01-03T21:35:00Z",
"trace_id": "99ad881f-1525-9bb4-70b6-b7164dd17ea4"
} | {
"account_age_days": 545,
"account_id": "ACCT-0FBC194F1B8B",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_2",
"session_entropy": 0.502
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 88,
"timestamp": "2026-01-03T19:04:00Z",
"transaction_amount_usd": 4.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.728,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3620844,
"financial_exposure_usd": 4345275.75,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106823",
"label": "benign",
"label_confidence": 0.738,
"severity": "medium",
"timestamp": "2026-01-05T17:43:00Z",
"trace_id": "77e43717-57f3-3697-7551-46a7adea41ff"
} | {
"account_age_days": 1250,
"account_id": "ACCT-5333B404FC2F",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_3",
"session_entropy": 0.776
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 416,
"timestamp": "2026-01-05T17:43:00Z",
"transaction_amount_usd": 7298.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 953.01,
"financial_exposure_usd": 1568.96,
"recoverable_pct": 0.782
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101056",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-01T17:36:00Z",
"trace_id": "4687a57e-c4e3-03b6-e2c7-75f91f2c6a70"
} | {
"account_age_days": 1395,
"account_id": "ACCT-23F969F273C9",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_2",
"session_entropy": 0.883
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 880,
"timestamp": "2026-01-01T17:36:00Z",
"transaction_amount_usd": 54041.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.871,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 195872.62,
"financial_exposure_usd": 415458.43,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102288",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "low",
"timestamp": "2026-01-02T14:08:00Z",
"trace_id": "9f9ad2fe-a637-f318-1b44-89673884c5e8"
} | {
"account_age_days": 1561,
"account_id": "ACCT-7A597F1CDB16",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_2",
"session_entropy": 0.429
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 977,
"timestamp": "2026-01-02T14:08:00Z",
"transaction_amount_usd": 39031.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.94,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 898748.75,
"financial_exposure_usd": 1061800.68,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101459",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "medium",
"timestamp": "2026-01-02T00:19:00Z",
"trace_id": "b37ddbb2-c2c5-5869-8769-767b490cd091"
} | {
"account_age_days": 414,
"account_id": "ACCT-B9D51D9DFFFC",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_3",
"session_entropy": 0.606
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 835,
"timestamp": "2026-01-02T00:19:00Z",
"transaction_amount_usd": 43456.79
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.558,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 253372.73,
"financial_exposure_usd": 565440.84,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102754",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-02T21:54:00Z",
"trace_id": "a2db3ee0-7877-36df-241a-189d75e4928c"
} | {
"account_age_days": 103,
"account_id": "ACCT-893714B7CF26",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_3",
"session_entropy": 0.914
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 188,
"timestamp": "2026-01-02T20:22:00Z",
"transaction_amount_usd": 19.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.603,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 264724.63,
"financial_exposure_usd": 390248.31,
"recoverable_pct": 0.013
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102191",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "high",
"timestamp": "2026-01-02T12:31:00Z",
"trace_id": "110ceb23-d2f3-7c4d-e4a4-f258f85ab15f"
} | {
"account_age_days": 371,
"account_id": "ACCT-28895C22F3EE",
"baseline_risk_score": 0.534,
"kyc_tier": "tier_3",
"session_entropy": 0.601
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 471,
"timestamp": "2026-01-02T12:31:00Z",
"transaction_amount_usd": 82515.46
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.805,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 523718.6,
"financial_exposure_usd": 647769.8,
"recoverable_pct": 0.166
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106239",
"label": "fraudulent",
"label_confidence": 0.656,
"severity": "high",
"timestamp": "2026-01-05T07:59:00Z",
"trace_id": "3bd898f4-321a-3474-a477-ba89f4b64e32"
} | {
"account_age_days": 403,
"account_id": "ACCT-450CCD93D25A",
"baseline_risk_score": 0.235,
"kyc_tier": "tier_1",
"session_entropy": 0.839
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 905,
"timestamp": "2026-01-05T07:59:00Z",
"transaction_amount_usd": 88808.34
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5020187.08,
"financial_exposure_usd": 6661846.74,
"recoverable_pct": 0.853
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107280",
"label": "benign",
"label_confidence": 0.479,
"severity": "low",
"timestamp": "2026-01-06T01:20:00Z",
"trace_id": "dfd30c40-aefc-00c5-b2b4-5f114c16137e"
} | {
"account_age_days": 1839,
"account_id": "ACCT-98FC3B746A1C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.822
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 272,
"timestamp": "2026-01-06T01:20:00Z",
"transaction_amount_usd": 10300.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.705,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4135.23,
"financial_exposure_usd": 4867.26,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104753",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "critical",
"timestamp": "2026-01-04T07:13:00Z",
"trace_id": "ad1d6ace-ca55-d785-f718-fecb6713b746"
} | {
"account_age_days": 1075,
"account_id": "ACCT-C94F20A00B4E",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.793
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 829,
"timestamp": "2026-01-04T07:13:00Z",
"transaction_amount_usd": 2786883.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.542,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1692137.45,
"financial_exposure_usd": 3944306.07,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108719",
"label": "benign",
"label_confidence": 0.504,
"severity": "low",
"timestamp": "2026-01-07T01:19:00Z",
"trace_id": "efa49377-120a-f58e-51c2-bbe556978a00"
} | {
"account_age_days": 1524,
"account_id": "ACCT-986B7C8F1F59",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.732
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1014,
"timestamp": "2026-01-07T01:19:00Z",
"transaction_amount_usd": 9568.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.523,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3586.54,
"financial_exposure_usd": 4834.59,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100465",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-01T07:45:00Z",
"trace_id": "cb18aba6-f0ef-b72c-0a12-cce64aae35bc"
} | {
"account_age_days": 226,
"account_id": "ACCT-70FDC01CF958",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_1",
"session_entropy": 0.726
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 550,
"timestamp": "2026-01-01T07:45:00Z",
"transaction_amount_usd": 11603.42
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.404,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 234067.34,
"financial_exposure_usd": 247264.74,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101933",
"label": "fraudulent",
"label_confidence": 0.819,
"severity": "medium",
"timestamp": "2026-01-02T08:13:00Z",
"trace_id": "1254f019-703e-f20b-20d3-6375c7292746"
} | {
"account_age_days": 1961,
"account_id": "ACCT-B81629316A3B",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_1",
"session_entropy": 0.191
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 320,
"timestamp": "2026-01-02T00:17:00Z",
"transaction_amount_usd": 18.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 602725.06,
"financial_exposure_usd": 947604.02,
"recoverable_pct": 0.295
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107843",
"label": "benign",
"label_confidence": 0.505,
"severity": "high",
"timestamp": "2026-01-06T10:43:00Z",
"trace_id": "d525cc6b-861f-6093-6fe0-b269d1ab28e4"
} | {
"account_age_days": 574,
"account_id": "ACCT-F3500EC2C43B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.227
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 207,
"timestamp": "2026-01-06T10:43:00Z",
"transaction_amount_usd": 13703.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.755,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1971.44,
"financial_exposure_usd": 3546.25,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102553",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "high",
"timestamp": "2026-01-02T18:33:00Z",
"trace_id": "cbaaf247-6bc1-a9d8-2f72-765225e38cf7"
} | {
"account_age_days": 875,
"account_id": "ACCT-CE5CD243B005",
"baseline_risk_score": 0.449,
"kyc_tier": "tier_1",
"session_entropy": 0.614
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 166,
"timestamp": "2026-01-02T08:28:00Z",
"transaction_amount_usd": 2.34
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.82,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 455146.88,
"financial_exposure_usd": 940714.99,
"recoverable_pct": 0.693
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104815",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-04T08:15:00Z",
"trace_id": "e37d7215-d7e7-001c-3b6d-48157bcf8cf6"
} | {
"account_age_days": 1515,
"account_id": "ACCT-79E7D3614B83",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_2",
"session_entropy": 0.3
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 965,
"timestamp": "2026-01-04T08:15:00Z",
"transaction_amount_usd": 2757379.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.402,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2899638.84,
"financial_exposure_usd": 6219458.78,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106955",
"label": "benign",
"label_confidence": 0.519,
"severity": "medium",
"timestamp": "2026-01-05T19:55:00Z",
"trace_id": "59c70ca9-a715-9804-b53c-c7c52cf1d4d8"
} | {
"account_age_days": 1450,
"account_id": "ACCT-4C860728E9F4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.303
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 217,
"timestamp": "2026-01-05T16:57:00Z",
"transaction_amount_usd": 2.43
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2353.16,
"financial_exposure_usd": 3944.11,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101802",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-02T06:02:00Z",
"trace_id": "8b5ac66c-4a04-1474-cc58-16ba5996d861"
} | {
"account_age_days": 198,
"account_id": "ACCT-2AE179C639D2",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_2",
"session_entropy": 0.895
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 235,
"timestamp": "2026-01-01T18:59:00Z",
"transaction_amount_usd": 21.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.754,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 469748.15,
"financial_exposure_usd": 508090.43,
"recoverable_pct": 0.065
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107546",
"label": "benign",
"label_confidence": 0.625,
"severity": "low",
"timestamp": "2026-01-06T05:46:00Z",
"trace_id": "7180681d-9494-2c5c-404d-86dabae889d6"
} | {
"account_age_days": 1604,
"account_id": "ACCT-D6814FFBFFFC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.748
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1006,
"timestamp": "2026-01-06T05:46:00Z",
"transaction_amount_usd": 13945.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 637.47,
"financial_exposure_usd": 1147.6,
"recoverable_pct": 0.555
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108424",
"label": "benign",
"label_confidence": 0.608,
"severity": "low",
"timestamp": "2026-01-06T20:24:00Z",
"trace_id": "255d4cc3-85f0-6e1e-0e95-e653e5249a55"
} | {
"account_age_days": 265,
"account_id": "ACCT-2BC07D9DEE68",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.245
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 148,
"timestamp": "2026-01-06T09:32:00Z",
"transaction_amount_usd": 8.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.534,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1696.83,
"financial_exposure_usd": 3451.22,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107817",
"label": "benign",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-06T10:17:00Z",
"trace_id": "072f8164-39c4-4277-24e1-68a6b01cf721"
} | {
"account_age_days": 1891,
"account_id": "ACCT-B3D7B30984E2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.542
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 103,
"timestamp": "2026-01-06T02:26:00Z",
"transaction_amount_usd": 2.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.797,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1071.13,
"financial_exposure_usd": 2463.09,
"recoverable_pct": 0.818
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109380",
"label": "benign",
"label_confidence": 0.711,
"severity": "high",
"timestamp": "2026-01-07T12:20:00Z",
"trace_id": "e6776f3e-3545-22f3-731c-431847136493"
} | {
"account_age_days": 1095,
"account_id": "ACCT-58E1DE88A787",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.943
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 147,
"timestamp": "2026-01-07T12:20:00Z",
"transaction_amount_usd": 8652.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1968.85,
"financial_exposure_usd": 2029.83,
"recoverable_pct": 0.527
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101312",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "critical",
"timestamp": "2026-01-01T21:52:00Z",
"trace_id": "a7e969c5-db2a-6ea4-2166-bbdb7b843c4b"
} | {
"account_age_days": 1282,
"account_id": "ACCT-92B1A6684259",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_2",
"session_entropy": 0.812
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 449,
"timestamp": "2026-01-01T21:52:00Z",
"transaction_amount_usd": 78813.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.406,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 389568.66,
"financial_exposure_usd": 564755.61,
"recoverable_pct": 0.068
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103307",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "medium",
"timestamp": "2026-01-03T07:07:00Z",
"trace_id": "08ddf593-8ccf-d3a6-7d58-60489165c0a1"
} | {
"account_age_days": 1357,
"account_id": "ACCT-83F298CF12A9",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_1",
"session_entropy": 0.591
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 504,
"timestamp": "2026-01-03T07:07:00Z",
"transaction_amount_usd": 118798.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.851,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 205136.17,
"financial_exposure_usd": 473445.6,
"recoverable_pct": 0.314
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103262",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "critical",
"timestamp": "2026-01-03T06:22:00Z",
"trace_id": "a62a2495-8d73-5a49-2344-94d2e29f29ad"
} | {
"account_age_days": 1494,
"account_id": "ACCT-ABE6CB0A9386",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_2",
"session_entropy": 0.656
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 136,
"timestamp": "2026-01-02T22:36:00Z",
"transaction_amount_usd": 14.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.462,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 583429.86,
"financial_exposure_usd": 858391.21,
"recoverable_pct": 0.108
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101972",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "low",
"timestamp": "2026-01-02T08:52:00Z",
"trace_id": "7c3019e2-e182-6476-241c-b2ac7c3324b9"
} | {
"account_age_days": 473,
"account_id": "ACCT-5F85154A1480",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 413,
"timestamp": "2026-01-02T08:52:00Z",
"transaction_amount_usd": 59120.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 811357.47,
"financial_exposure_usd": 1023145.23,
"recoverable_pct": 0.207
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103448",
"label": "fraudulent",
"label_confidence": 0.642,
"severity": "high",
"timestamp": "2026-01-03T09:28:00Z",
"trace_id": "90e51e4e-d049-d994-28a7-b1874521ea4a"
} | {
"account_age_days": 1272,
"account_id": "ACCT-E7D499223E01",
"baseline_risk_score": 0.074,
"kyc_tier": "tier_2",
"session_entropy": 0.937
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 231,
"timestamp": "2026-01-03T06:14:00Z",
"transaction_amount_usd": 23.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.489,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4796517.56,
"financial_exposure_usd": 8703468.8,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102869",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "medium",
"timestamp": "2026-01-02T23:49:00Z",
"trace_id": "d85614bf-ba7e-7305-4e91-497c1882f62c"
} | {
"account_age_days": 591,
"account_id": "ACCT-631CEF0F63F4",
"baseline_risk_score": 0.539,
"kyc_tier": "tier_1",
"session_entropy": 0.643
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 890,
"timestamp": "2026-01-02T23:49:00Z",
"transaction_amount_usd": 109716.03
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.45,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 229418.52,
"financial_exposure_usd": 314634.04,
"recoverable_pct": 0.015
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106216",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "low",
"timestamp": "2026-01-05T07:36:00Z",
"trace_id": "756dc684-4734-005e-e476-069e8847f707"
} | {
"account_age_days": 226,
"account_id": "ACCT-BB68C7B8DD8F",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_3",
"session_entropy": 0.188
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 482,
"timestamp": "2026-01-05T07:36:00Z",
"transaction_amount_usd": 1975606.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.574,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2786989.77,
"financial_exposure_usd": 5165740.55,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103908",
"label": "fraudulent",
"label_confidence": 0.664,
"severity": "high",
"timestamp": "2026-01-03T17:08:00Z",
"trace_id": "87c751e1-d6c2-7dfc-dd43-6d805dc6df45"
} | {
"account_age_days": 67,
"account_id": "ACCT-E34766AC1DD6",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_3",
"session_entropy": 0.211
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 136,
"timestamp": "2026-01-03T17:08:00Z",
"transaction_amount_usd": 1464206.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.928,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3091333.76,
"financial_exposure_usd": 7513839.69,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106075",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-05T05:15:00Z",
"trace_id": "3e017162-5603-a3aa-386e-2b32aea86429"
} | {
"account_age_days": 808,
"account_id": "ACCT-1CC2C9ED5871",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_2",
"session_entropy": 0.592
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 927,
"timestamp": "2026-01-05T05:15:00Z",
"transaction_amount_usd": 61716.02
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.554,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6551311.88,
"financial_exposure_usd": 6920503.93,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106524",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "low",
"timestamp": "2026-01-05T12:44:00Z",
"trace_id": "a757df2e-4b8a-bf0b-a827-8e1869be2705"
} | {
"account_age_days": 323,
"account_id": "ACCT-BE38DD1487E5",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_3",
"session_entropy": 0.383
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 115,
"timestamp": "2026-01-05T12:44:00Z",
"transaction_amount_usd": 1040248.4
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.725,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4889521.82,
"financial_exposure_usd": 5826418.5,
"recoverable_pct": 0.865
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103190",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "medium",
"timestamp": "2026-01-03T05:10:00Z",
"trace_id": "77e25bba-25bb-d825-dfa2-a9285a40c3b8"
} | {
"account_age_days": 1531,
"account_id": "ACCT-9379783A7FF5",
"baseline_risk_score": 0.423,
"kyc_tier": "tier_3",
"session_entropy": 0.652
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 644,
"timestamp": "2026-01-03T05:10:00Z",
"transaction_amount_usd": 91281.74
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.661,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 704931.43,
"financial_exposure_usd": 869276.66,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101411",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "critical",
"timestamp": "2026-01-01T23:31:00Z",
"trace_id": "71f1c359-7120-9d02-0db2-7c49822c3d6b"
} | {
"account_age_days": 1600,
"account_id": "ACCT-9A818E5A2216",
"baseline_risk_score": 0.633,
"kyc_tier": "tier_3",
"session_entropy": 0.669
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 237,
"timestamp": "2026-01-01T17:51:00Z",
"transaction_amount_usd": 20.39
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.491,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 806170.63,
"financial_exposure_usd": 951868.42,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108801",
"label": "benign",
"label_confidence": 0.622,
"severity": "low",
"timestamp": "2026-01-07T02:41:00Z",
"trace_id": "02ae41bd-d8ba-ba6f-e2da-40891165020b"
} | {
"account_age_days": 1087,
"account_id": "ACCT-579E4752A2B1",
"baseline_risk_score": 0.12,
"kyc_tier": "tier_1",
"session_entropy": 0.602
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 306,
"timestamp": "2026-01-06T22:31:00Z",
"transaction_amount_usd": 17.72
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1905.3,
"financial_exposure_usd": 2830.01,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106157",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "high",
"timestamp": "2026-01-05T06:37:00Z",
"trace_id": "e8e0760e-9a21-a895-3db8-6cff0e4eeda7"
} | {
"account_age_days": 175,
"account_id": "ACCT-9D0CEB19DDE7",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 950,
"timestamp": "2026-01-05T06:37:00Z",
"transaction_amount_usd": 814570.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.729,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4051419.52,
"financial_exposure_usd": 4159859.81,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107087",
"label": "benign",
"label_confidence": 0.735,
"severity": "medium",
"timestamp": "2026-01-05T22:07:00Z",
"trace_id": "d2d8aebf-b08f-bdc5-dcc3-110f037d043d"
} | {
"account_age_days": 761,
"account_id": "ACCT-23A82D2AB1B7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.268
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1009,
"timestamp": "2026-01-05T22:07:00Z",
"transaction_amount_usd": 11011.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 228.38,
"financial_exposure_usd": 559.6,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102271",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-02T13:51:00Z",
"trace_id": "92b1493f-457d-4e94-96d1-ccce0f401ec2"
} | {
"account_age_days": 234,
"account_id": "ACCT-3B26CDB984DD",
"baseline_risk_score": 0.334,
"kyc_tier": "tier_3",
"session_entropy": 0.651
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 104,
"timestamp": "2026-01-02T13:51:00Z",
"transaction_amount_usd": 26271.29
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.712,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 440632.71,
"financial_exposure_usd": 736119.63,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102215",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "high",
"timestamp": "2026-01-02T12:55:00Z",
"trace_id": "eb1e77ed-f3c1-d3fa-8340-9019c10542ce"
} | {
"account_age_days": 221,
"account_id": "ACCT-660D53316A42",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_2",
"session_entropy": 0.438
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 194,
"timestamp": "2026-01-02T12:55:00Z",
"transaction_amount_usd": 18433.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.8,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 205384.2,
"financial_exposure_usd": 269685.24,
"recoverable_pct": 0.799
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106534",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "high",
"timestamp": "2026-01-05T12:54:00Z",
"trace_id": "c7a2d387-eefe-fe3a-7fcc-237f89caf5df"
} | {
"account_age_days": 1612,
"account_id": "ACCT-241ADB8E1897",
"baseline_risk_score": 0.251,
"kyc_tier": "tier_1",
"session_entropy": 0.211
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 706,
"timestamp": "2026-01-05T12:54:00Z",
"transaction_amount_usd": 2764879.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.395,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7212550.93,
"financial_exposure_usd": 7572028.56,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100900",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "medium",
"timestamp": "2026-01-01T15:00:00Z",
"trace_id": "40421839-ca50-1415-016d-6695771e3708"
} | {
"account_age_days": 983,
"account_id": "ACCT-C0B33263EE67",
"baseline_risk_score": 0.274,
"kyc_tier": "tier_2",
"session_entropy": 0.639
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 592,
"timestamp": "2026-01-01T15:00:00Z",
"transaction_amount_usd": 23054.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.363,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 743475.25,
"financial_exposure_usd": 793242.03,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101910",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-02T07:50:00Z",
"trace_id": "eafd4967-fdc7-7403-3da8-7b18996d0cec"
} | {
"account_age_days": 329,
"account_id": "ACCT-7A8150472178",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_3",
"session_entropy": 0.368
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 222,
"timestamp": "2026-01-02T00:45:00Z",
"transaction_amount_usd": 11.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.514,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 492734.73,
"financial_exposure_usd": 678285.31,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101979",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-02T08:59:00Z",
"trace_id": "e71dbe11-0758-2be4-1fa1-39852bc8eb0d"
} | {
"account_age_days": 644,
"account_id": "ACCT-074B827395DD",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_2",
"session_entropy": 0.436
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 97,
"timestamp": "2026-01-02T06:48:00Z",
"transaction_amount_usd": 6.91
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.352,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 171145.49,
"financial_exposure_usd": 202370.78,
"recoverable_pct": 0.368
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101166",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "high",
"timestamp": "2026-01-01T19:26:00Z",
"trace_id": "f9419942-85e1-eafd-d5d7-91c04afd5e41"
} | {
"account_age_days": 673,
"account_id": "ACCT-AE97EC2182DA",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_3",
"session_entropy": 0.607
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 127,
"timestamp": "2026-01-01T12:26:00Z",
"transaction_amount_usd": 5.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 837604.56,
"financial_exposure_usd": 1028142.54,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103558",
"label": "fraudulent",
"label_confidence": 0.62,
"severity": "high",
"timestamp": "2026-01-03T11:18:00Z",
"trace_id": "e20edcb0-dc88-9e47-b938-a6e326906e94"
} | {
"account_age_days": 1092,
"account_id": "ACCT-6D3FAB8BDD64",
"baseline_risk_score": 0.301,
"kyc_tier": "tier_1",
"session_entropy": 0.138
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 496,
"timestamp": "2026-01-03T11:18:00Z",
"transaction_amount_usd": 363359.01
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.754,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3758546.07,
"financial_exposure_usd": 7641252.45,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103140",
"label": "fraudulent",
"label_confidence": 0.787,
"severity": "critical",
"timestamp": "2026-01-03T04:20:00Z",
"trace_id": "1128e103-a88b-5f1b-52a1-86d7dc2dd06b"
} | {
"account_age_days": 244,
"account_id": "ACCT-EE38DEF77DFF",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.144
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1009,
"timestamp": "2026-01-03T04:20:00Z",
"transaction_amount_usd": 19691.51
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.787,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 269682.06,
"financial_exposure_usd": 389906.8,
"recoverable_pct": 0.683
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106835",
"label": "benign",
"label_confidence": 0.73,
"severity": "medium",
"timestamp": "2026-01-05T17:55:00Z",
"trace_id": "95e1ab54-5939-267a-8a52-5fdc8323f4cb"
} | {
"account_age_days": 1994,
"account_id": "ACCT-EF8AFB015615",
"baseline_risk_score": 0.123,
"kyc_tier": "tier_3",
"session_entropy": 0.161
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 626,
"timestamp": "2026-01-05T17:55:00Z",
"transaction_amount_usd": 878.92
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2399.63,
"financial_exposure_usd": 5432.54,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106657",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-05T14:57:00Z",
"trace_id": "3e9033f2-5429-17d5-1f48-bbdef0d4cf0b"
} | {
"account_age_days": 410,
"account_id": "ACCT-C96109852269",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_2",
"session_entropy": 0.785
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 300,
"timestamp": "2026-01-05T02:24:00Z",
"transaction_amount_usd": 18.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.449,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2138882.65,
"financial_exposure_usd": 2770439.74,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106227",
"label": "fraudulent",
"label_confidence": 0.689,
"severity": "high",
"timestamp": "2026-01-05T07:47:00Z",
"trace_id": "eb4566c0-e772-98b3-9d56-d48bd6e17362"
} | {
"account_age_days": 378,
"account_id": "ACCT-952D04865F69",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_2",
"session_entropy": 0.541
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 340,
"timestamp": "2026-01-05T06:03:00Z",
"transaction_amount_usd": 16.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.374,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3291677.44,
"financial_exposure_usd": 4421678.83,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101549",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "critical",
"timestamp": "2026-01-02T01:49:00Z",
"trace_id": "13213852-2442-194c-9ab2-069b4d608337"
} | {
"account_age_days": 541,
"account_id": "ACCT-D94398EBF5A7",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_1",
"session_entropy": 0.475
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 594,
"timestamp": "2026-01-02T01:49:00Z",
"transaction_amount_usd": 45078.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.455,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 451027.75,
"financial_exposure_usd": 485399.55,
"recoverable_pct": 0.065
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104427",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-04T01:47:00Z",
"trace_id": "68851f24-1075-2e01-b557-73d2298657ac"
} | {
"account_age_days": 72,
"account_id": "ACCT-A0B406AA898D",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_3",
"session_entropy": 0.354
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 173,
"timestamp": "2026-01-04T01:47:00Z",
"transaction_amount_usd": 1499085.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.431,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4184904.42,
"financial_exposure_usd": 7109519.89,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105407",
"label": "fraudulent",
"label_confidence": 0.723,
"severity": "low",
"timestamp": "2026-01-04T18:07:00Z",
"trace_id": "b96ec0e8-58fb-fc50-3c97-09285292831d"
} | {
"account_age_days": 996,
"account_id": "ACCT-5C5BA20DC9D7",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_2",
"session_entropy": 0.878
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 105,
"timestamp": "2026-01-04T07:56:00Z",
"transaction_amount_usd": 9.53
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.794,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 968984.14,
"financial_exposure_usd": 2297116.97,
"recoverable_pct": 0.897
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104067",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-03T19:47:00Z",
"trace_id": "f88be8b4-036b-5ff5-2dd8-05e13bd299e2"
} | {
"account_age_days": 1571,
"account_id": "ACCT-5AB3E1EC9E60",
"baseline_risk_score": 0.082,
"kyc_tier": "tier_1",
"session_entropy": 0.818
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 194,
"timestamp": "2026-01-03T11:32:00Z",
"transaction_amount_usd": 8.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.494,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5284051.33,
"financial_exposure_usd": 7603025.88,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108753",
"label": "benign",
"label_confidence": 0.516,
"severity": "low",
"timestamp": "2026-01-07T01:53:00Z",
"trace_id": "d33d9e18-bacf-a0ff-1ceb-1299912f1140"
} | {
"account_age_days": 434,
"account_id": "ACCT-4EFDBC5F5A2F",
"baseline_risk_score": 0.066,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 682,
"timestamp": "2026-01-07T01:53:00Z",
"transaction_amount_usd": 6334.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.748,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1045.43,
"financial_exposure_usd": 1103.21,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106540",
"label": "fraudulent",
"label_confidence": 0.749,
"severity": "critical",
"timestamp": "2026-01-05T13:00:00Z",
"trace_id": "09cc687d-2c35-691e-1fff-e961db327cff"
} | {
"account_age_days": 1385,
"account_id": "ACCT-419D560F820A",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.483
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1116,
"timestamp": "2026-01-05T13:00:00Z",
"transaction_amount_usd": 2543911.43
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.351,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2332293.43,
"financial_exposure_usd": 5430610.71,
"recoverable_pct": 0.708
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100394",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "high",
"timestamp": "2026-01-01T06:34:00Z",
"trace_id": "0218c6a9-d29e-8c00-bb99-da582a498fca"
} | {
"account_age_days": 231,
"account_id": "ACCT-B991F5EAB8B7",
"baseline_risk_score": 0.583,
"kyc_tier": "tier_1",
"session_entropy": 0.87
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 173,
"timestamp": "2026-01-01T06:34:00Z",
"transaction_amount_usd": 34003.51
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.744,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 214072.37,
"financial_exposure_usd": 378981.22,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105499",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "high",
"timestamp": "2026-01-04T19:39:00Z",
"trace_id": "d37f2b99-7e67-5bee-ffe8-7c35c8bf6c7d"
} | {
"account_age_days": 1347,
"account_id": "ACCT-D8A9CF54813C",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_2",
"session_entropy": 0.294
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 272,
"timestamp": "2026-01-04T19:39:00Z",
"transaction_amount_usd": 1165609.31
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.671,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2275182.24,
"financial_exposure_usd": 3001607.25,
"recoverable_pct": 0.586
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109732",
"label": "benign",
"label_confidence": 0.523,
"severity": "high",
"timestamp": "2026-01-07T18:12:00Z",
"trace_id": "0de887cb-8dde-2bec-fd32-e3b4b0daa2be"
} | {
"account_age_days": 941,
"account_id": "ACCT-BFA4B751C70D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.223
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 533,
"timestamp": "2026-01-07T18:12:00Z",
"transaction_amount_usd": 6181.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1715.61,
"financial_exposure_usd": 2763.04,
"recoverable_pct": 0.991
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106721",
"label": "benign",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-05T16:01:00Z",
"trace_id": "45c91324-8383-0151-c123-4e6419978b08"
} | {
"account_age_days": 993,
"account_id": "ACCT-741CB7F09C57",
"baseline_risk_score": 0.117,
"kyc_tier": "tier_2",
"session_entropy": 0.153
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 175,
"timestamp": "2026-01-05T03:38:00Z",
"transaction_amount_usd": 9.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1120.85,
"financial_exposure_usd": 1536.27,
"recoverable_pct": 0.47
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-110001",
"label": "benign",
"label_confidence": 0.651,
"severity": "low",
"timestamp": "2026-01-07T22:41:00Z",
"trace_id": "e0e1913d-16d9-f593-5661-b414642759a2"
} | {
"account_age_days": 993,
"account_id": "ACCT-5A01AACC9D8E",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_3",
"session_entropy": 0.904
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 431,
"timestamp": "2026-01-07T22:41:00Z",
"transaction_amount_usd": 9317.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.601,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 833.37,
"financial_exposure_usd": 1345.04,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101017",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "high",
"timestamp": "2026-01-01T16:57:00Z",
"trace_id": "bbd76c95-1faf-ff4c-ac0f-0b1b80913daa"
} | {
"account_age_days": 1279,
"account_id": "ACCT-74D503CDD1E3",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_3",
"session_entropy": 0.286
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 193,
"timestamp": "2026-01-01T16:57:00Z",
"transaction_amount_usd": 114997.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.789,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 919148.41,
"financial_exposure_usd": 1106079.01,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106973",
"label": "benign",
"label_confidence": 0.568,
"severity": "low",
"timestamp": "2026-01-05T20:13:00Z",
"trace_id": "ca518160-6b67-5f50-1c8f-7d6fa51b9982"
} | {
"account_age_days": 1400,
"account_id": "ACCT-65D9123DEAD5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 932,
"timestamp": "2026-01-05T20:13:00Z",
"transaction_amount_usd": 2462.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4068.18,
"financial_exposure_usd": 4962.69,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109070",
"label": "benign",
"label_confidence": 0.642,
"severity": "low",
"timestamp": "2026-01-07T07:10:00Z",
"trace_id": "f218380a-c4d4-ae0b-0890-f108fc454955"
} | {
"account_age_days": 826,
"account_id": "ACCT-C63C83264C87",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.704
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 604,
"timestamp": "2026-01-07T07:10:00Z",
"transaction_amount_usd": 11862.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.746,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1712.2,
"financial_exposure_usd": 1979.65,
"recoverable_pct": 0.525
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103166",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "high",
"timestamp": "2026-01-03T04:46:00Z",
"trace_id": "ba879338-1583-2e62-e77d-5de94addceb9"
} | {
"account_age_days": 1778,
"account_id": "ACCT-202C9138E7D2",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_2",
"session_entropy": 0.332
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 239,
"timestamp": "2026-01-02T23:35:00Z",
"transaction_amount_usd": 12.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.746,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 332292.64,
"financial_exposure_usd": 686044.99,
"recoverable_pct": 0.739
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104264",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "medium",
"timestamp": "2026-01-03T23:04:00Z",
"trace_id": "145c911d-6d1c-ae0f-f24b-98d2c35fbb7f"
} | {
"account_age_days": 392,
"account_id": "ACCT-6D8F9F94A391",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.636
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1013,
"timestamp": "2026-01-03T23:04:00Z",
"transaction_amount_usd": 123750.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.488,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 546613.49,
"financial_exposure_usd": 904762.48,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108472",
"label": "benign",
"label_confidence": 0.549,
"severity": "low",
"timestamp": "2026-01-06T21:12:00Z",
"trace_id": "f3e33a23-360d-271c-d4b4-e34c05aab412"
} | {
"account_age_days": 665,
"account_id": "ACCT-95A8308A7C49",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.833
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 347,
"timestamp": "2026-01-06T18:45:00Z",
"transaction_amount_usd": 11.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1151.93,
"financial_exposure_usd": 1375,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104515",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "high",
"timestamp": "2026-01-04T03:15:00Z",
"trace_id": "ee2b9ae5-9638-5e15-ebf0-2064cdf5a57f"
} | {
"account_age_days": 363,
"account_id": "ACCT-D46BAD9A4535",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_2",
"session_entropy": 0.295
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 151,
"timestamp": "2026-01-04T03:15:00Z",
"transaction_amount_usd": 2315525.71
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.625,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2415498.45,
"financial_exposure_usd": 4110480.23,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109194",
"label": "benign",
"label_confidence": 0.675,
"severity": "medium",
"timestamp": "2026-01-07T09:14:00Z",
"trace_id": "429227a4-6a16-b8cb-cf1b-9acb75612e1c"
} | {
"account_age_days": 1789,
"account_id": "ACCT-59DE13569898",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.898
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 270,
"timestamp": "2026-01-07T04:51:00Z",
"transaction_amount_usd": 10.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3798.66,
"financial_exposure_usd": 5101.49,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109889",
"label": "benign",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-07T20:49:00Z",
"trace_id": "09a5d270-a6e7-0a85-2ea2-93eca105fb44"
} | {
"account_age_days": 767,
"account_id": "ACCT-43FB8326E923",
"baseline_risk_score": 0.072,
"kyc_tier": "tier_2",
"session_entropy": 0.481
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 861,
"timestamp": "2026-01-07T20:49:00Z",
"transaction_amount_usd": 5921.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.774,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2288.92,
"financial_exposure_usd": 2404.41,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104941",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "low",
"timestamp": "2026-01-04T10:21:00Z",
"trace_id": "fe92390c-8a15-b757-dba1-7657109ba746"
} | {
"account_age_days": 965,
"account_id": "ACCT-5784172B55AE",
"baseline_risk_score": 0.313,
"kyc_tier": "tier_2",
"session_entropy": 0.55
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 285,
"timestamp": "2026-01-04T10:21:00Z",
"transaction_amount_usd": 2075204.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.858,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6085525.75,
"financial_exposure_usd": 6943040.72,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109415",
"label": "benign",
"label_confidence": 0.512,
"severity": "high",
"timestamp": "2026-01-07T12:55:00Z",
"trace_id": "9e0863b4-a36c-1e2a-3916-42bfb3c0cc2b"
} | {
"account_age_days": 1749,
"account_id": "ACCT-74C54C3FABED",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 297,
"timestamp": "2026-01-07T10:08:00Z",
"transaction_amount_usd": 21.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2129.51,
"financial_exposure_usd": 2257.38,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102068",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "high",
"timestamp": "2026-01-02T10:28:00Z",
"trace_id": "e380af64-5d05-dbb2-f395-072487b24771"
} | {
"account_age_days": 673,
"account_id": "ACCT-A75BF7BE8C9D",
"baseline_risk_score": 0.614,
"kyc_tier": "tier_3",
"session_entropy": 0.523
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 269,
"timestamp": "2026-01-02T07:21:00Z",
"transaction_amount_usd": 18.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.653,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 619494.94,
"financial_exposure_usd": 626398.25,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102903",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "medium",
"timestamp": "2026-01-03T00:23:00Z",
"trace_id": "0725e060-33b5-f638-d641-2a2e1c3d6c68"
} | {
"account_age_days": 1779,
"account_id": "ACCT-37D0987F32AB",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_1",
"session_entropy": 0.706
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1190,
"timestamp": "2026-01-03T00:23:00Z",
"transaction_amount_usd": 8864.67
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.535,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 488206.84,
"financial_exposure_usd": 702222.47,
"recoverable_pct": 0.721
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105316",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "high",
"timestamp": "2026-01-04T16:36:00Z",
"trace_id": "938a69a2-8f16-62e8-6fc5-8a5aaf8457e2"
} | {
"account_age_days": 339,
"account_id": "ACCT-3A4CAE4AB66F",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_1",
"session_entropy": 0.308
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 748,
"timestamp": "2026-01-04T16:36:00Z",
"transaction_amount_usd": 2221026.46
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.453,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3745895.42,
"financial_exposure_usd": 5941786.68,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101414",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "low",
"timestamp": "2026-01-01T23:34:00Z",
"trace_id": "b90bc606-f4a6-8db8-2e54-f7befccc4cc7"
} | {
"account_age_days": 70,
"account_id": "ACCT-89BBC9EFDBC5",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.58
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 790,
"timestamp": "2026-01-01T23:34:00Z",
"transaction_amount_usd": 103745.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.504,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 427845.46,
"financial_exposure_usd": 504974.26,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108673",
"label": "benign",
"label_confidence": 0.582,
"severity": "high",
"timestamp": "2026-01-07T00:33:00Z",
"trace_id": "27f05a1e-c4ec-4b7d-7e7a-2b7ed354284c"
} | {
"account_age_days": 1507,
"account_id": "ACCT-0837B52AC3C9",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_3",
"session_entropy": 0.256
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 393,
"timestamp": "2026-01-07T00:33:00Z",
"transaction_amount_usd": 12383.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 2054.61,
"financial_exposure_usd": 2731.98,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103659",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "high",
"timestamp": "2026-01-03T12:59:00Z",
"trace_id": "6ae637e8-9fcc-d250-7409-9ae433dedbc1"
} | {
"account_age_days": 1223,
"account_id": "ACCT-2FC573DC8A30",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_3",
"session_entropy": 0.597
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 377,
"timestamp": "2026-01-03T12:59:00Z",
"transaction_amount_usd": 1840365.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.923,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2033085.1,
"financial_exposure_usd": 3656747.67,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107529",
"label": "benign",
"label_confidence": 0.574,
"severity": "high",
"timestamp": "2026-01-06T05:29:00Z",
"trace_id": "f8f8e6f4-eda1-9d57-b8cc-b9d27af1b4ee"
} | {
"account_age_days": 1301,
"account_id": "ACCT-9C2149A0D7CF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.893
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 318,
"timestamp": "2026-01-05T18:29:00Z",
"transaction_amount_usd": 24.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 417.56,
"financial_exposure_usd": 588.02,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103884",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "medium",
"timestamp": "2026-01-03T16:44:00Z",
"trace_id": "ac5e2c21-32d4-e732-6841-d9d6c0455aff"
} | {
"account_age_days": 1315,
"account_id": "ACCT-9E29EDE890E8",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.266
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 906,
"timestamp": "2026-01-03T16:44:00Z",
"transaction_amount_usd": 1600660.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.509,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2796352.93,
"financial_exposure_usd": 3804637.79,
"recoverable_pct": 0.56
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104599",
"label": "fraudulent",
"label_confidence": 0.708,
"severity": "medium",
"timestamp": "2026-01-04T04:39:00Z",
"trace_id": "6abcd0cb-c3f7-c4df-0952-89be015929eb"
} | {
"account_age_days": 435,
"account_id": "ACCT-FB9F7A604427",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_3",
"session_entropy": 0.749
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 310,
"timestamp": "2026-01-03T16:07:00Z",
"transaction_amount_usd": 19.06
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.789,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3363124.38,
"financial_exposure_usd": 5116666.27,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109035",
"label": "benign",
"label_confidence": 0.539,
"severity": "high",
"timestamp": "2026-01-07T06:35:00Z",
"trace_id": "4abd22c2-900a-9ac7-a5e6-6dc4001b9990"
} | {
"account_age_days": 985,
"account_id": "ACCT-908C406028FA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.638
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 279,
"timestamp": "2026-01-07T01:18:00Z",
"transaction_amount_usd": 12.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.676,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 841.48,
"financial_exposure_usd": 1523.53,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108384",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-06T19:44:00Z",
"trace_id": "bc874043-9b04-3f93-038b-ba7e8f9e1e5f"
} | {
"account_age_days": 1498,
"account_id": "ACCT-E23AEF158AAC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.695
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 135,
"timestamp": "2026-01-06T19:44:00Z",
"transaction_amount_usd": 1412.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 941.62,
"financial_exposure_usd": 1675.82,
"recoverable_pct": 0.987
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106244",
"label": "fraudulent",
"label_confidence": 0.708,
"severity": "high",
"timestamp": "2026-01-05T08:04:00Z",
"trace_id": "f2299ccb-0be0-4e1c-9e9c-e9610e14a790"
} | {
"account_age_days": 1997,
"account_id": "ACCT-B6ADE2AE3D0C",
"baseline_risk_score": 0.185,
"kyc_tier": "tier_3",
"session_entropy": 0.319
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 869,
"timestamp": "2026-01-05T08:04:00Z",
"transaction_amount_usd": 1692654.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.436,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2748403.42,
"financial_exposure_usd": 5098421.25,
"recoverable_pct": 0.483
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105687",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "high",
"timestamp": "2026-01-04T22:47:00Z",
"trace_id": "b2e39c4c-b265-ac33-d813-659bb89a4c3b"
} | {
"account_age_days": 1234,
"account_id": "ACCT-E6C1D709DB76",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_2",
"session_entropy": 0.94
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 663,
"timestamp": "2026-01-04T22:47:00Z",
"transaction_amount_usd": 1534371.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.585,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2177913.78,
"financial_exposure_usd": 4122939.78,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100392",
"label": "fraudulent",
"label_confidence": 0.971,
"severity": "medium",
"timestamp": "2026-01-01T06:32:00Z",
"trace_id": "26618449-e08f-6d7b-bb28-7a6d1a07657b"
} | {
"account_age_days": 1018,
"account_id": "ACCT-ADA45EB26873",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_2",
"session_entropy": 0.76
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1090,
"timestamp": "2026-01-01T06:32:00Z",
"transaction_amount_usd": 8125.04
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.782,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 315280.56,
"financial_exposure_usd": 360984.23,
"recoverable_pct": 0.308
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106074",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-05T05:14:00Z",
"trace_id": "d59681dc-8627-fe5e-34aa-063933f1ee76"
} | {
"account_age_days": 1540,
"account_id": "ACCT-B8599829228C",
"baseline_risk_score": 0.259,
"kyc_tier": "tier_1",
"session_entropy": 0.548
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 515,
"timestamp": "2026-01-05T05:14:00Z",
"transaction_amount_usd": 811275.31
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.408,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3701498.53,
"financial_exposure_usd": 7359752.79,
"recoverable_pct": 0.674
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100752",
"label": "fraudulent",
"label_confidence": 0.826,
"severity": "high",
"timestamp": "2026-01-01T12:32:00Z",
"trace_id": "307301a4-ae7d-7081-a7cd-d8009b10bbbd"
} | {
"account_age_days": 232,
"account_id": "ACCT-0069DAD212CC",
"baseline_risk_score": 0.388,
"kyc_tier": "tier_3",
"session_entropy": 0.678
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 369,
"timestamp": "2026-01-01T06:09:00Z",
"transaction_amount_usd": 9.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.757,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 579927.24,
"financial_exposure_usd": 670998.43,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107058",
"label": "benign",
"label_confidence": 0.722,
"severity": "medium",
"timestamp": "2026-01-05T21:38:00Z",
"trace_id": "389807e7-bfa2-8030-8dfc-1d8574353434"
} | {
"account_age_days": 1022,
"account_id": "ACCT-2ECD93C16771",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.444
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 279,
"timestamp": "2026-01-05T12:17:00Z",
"transaction_amount_usd": 17.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.718,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1401.28,
"financial_exposure_usd": 1565.73,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101638",
"label": "fraudulent",
"label_confidence": 0.809,
"severity": "critical",
"timestamp": "2026-01-02T03:18:00Z",
"trace_id": "d53dcde1-f6e7-1812-7681-50b5f61bcfc8"
} | {
"account_age_days": 556,
"account_id": "ACCT-B1F519398F93",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1180,
"timestamp": "2026-01-02T03:18:00Z",
"transaction_amount_usd": 111153.35
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.881,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 934006.46,
"financial_exposure_usd": 1002773.93,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100034",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "high",
"timestamp": "2026-01-01T00:34:00Z",
"trace_id": "ef4c5119-8da5-d39b-42c2-17970426fcc9"
} | {
"account_age_days": 1668,
"account_id": "ACCT-49646B96FA3C",
"baseline_risk_score": 0.255,
"kyc_tier": "tier_3",
"session_entropy": 0.115
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 583,
"timestamp": "2026-01-01T00:34:00Z",
"transaction_amount_usd": 50400.58
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.834,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 375468.73,
"financial_exposure_usd": 808834.04,
"recoverable_pct": 0.082
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103995",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "medium",
"timestamp": "2026-01-03T18:35:00Z",
"trace_id": "da05e6de-d75a-8ce7-ff24-8989b8cdc0d4"
} | {
"account_age_days": 236,
"account_id": "ACCT-3D00B4A10816",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_2",
"session_entropy": 0.14
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 367,
"timestamp": "2026-01-03T18:35:00Z",
"transaction_amount_usd": 177886.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.433,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3549501.42,
"financial_exposure_usd": 5723114.95,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100730",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "low",
"timestamp": "2026-01-01T12:10:00Z",
"trace_id": "e4839e22-a37c-e071-c3c8-25d4e46b2af9"
} | {
"account_age_days": 757,
"account_id": "ACCT-1521DFB4C063",
"baseline_risk_score": 0.441,
"kyc_tier": "tier_3",
"session_entropy": 0.23
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 499,
"timestamp": "2026-01-01T12:10:00Z",
"transaction_amount_usd": 80829.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.596,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 788217.41,
"financial_exposure_usd": 1107642.56,
"recoverable_pct": 0.174
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106782",
"label": "benign",
"label_confidence": 0.465,
"severity": "medium",
"timestamp": "2026-01-05T17:02:00Z",
"trace_id": "1e2f3c9c-7e0f-89a6-9452-f7f09decba11"
} | {
"account_age_days": 1652,
"account_id": "ACCT-B054D15E6CA6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.487
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 317,
"timestamp": "2026-01-05T12:46:00Z",
"transaction_amount_usd": 2.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.783,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 664.56,
"financial_exposure_usd": 1512.32,
"recoverable_pct": 0.524
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100323",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-01T05:23:00Z",
"trace_id": "eb428215-4c3d-8a35-35b9-298303617d89"
} | {
"account_age_days": 1263,
"account_id": "ACCT-83117EFCB0B4",
"baseline_risk_score": 0.628,
"kyc_tier": "tier_2",
"session_entropy": 0.194
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1035,
"timestamp": "2026-01-01T05:23:00Z",
"transaction_amount_usd": 29263.87
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.428,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 369620.36,
"financial_exposure_usd": 458524.81,
"recoverable_pct": 0.747
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108840",
"label": "benign",
"label_confidence": 0.715,
"severity": "high",
"timestamp": "2026-01-07T03:20:00Z",
"trace_id": "aad2d4fb-b7ec-ab20-7b10-6a97ee053600"
} | {
"account_age_days": 121,
"account_id": "ACCT-7C332DDFD291",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_3",
"session_entropy": 0.312
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 583,
"timestamp": "2026-01-07T03:20:00Z",
"transaction_amount_usd": 14004.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5175.17,
"financial_exposure_usd": 5651.41,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101199",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "medium",
"timestamp": "2026-01-01T19:59:00Z",
"trace_id": "e491f860-0017-c95b-fbb3-e582d5e88470"
} | {
"account_age_days": 1142,
"account_id": "ACCT-8F4EF87A1963",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_1",
"session_entropy": 0.764
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 184,
"timestamp": "2026-01-01T19:59:00Z",
"transaction_amount_usd": 18062.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.542,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 796449.98,
"financial_exposure_usd": 1061667.81,
"recoverable_pct": 0.144
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.