schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101774",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "medium",
"timestamp": "2026-01-02T05:34:00Z",
"trace_id": "c2a97fa4-99ef-4802-4d4c-289d03651837"
} | {
"account_age_days": 172,
"account_id": "ACCT-9449370409BD",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_3",
"session_entropy": 0.141
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 295,
"timestamp": "2026-01-01T22:41:00Z",
"transaction_amount_usd": 14.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.468,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 452291.12,
"financial_exposure_usd": 670191.29,
"recoverable_pct": 0.162
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107360",
"label": "benign",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-06T02:40:00Z",
"trace_id": "65a3f51f-7c3e-336a-dadd-d0ccfc542886"
} | {
"account_age_days": 82,
"account_id": "ACCT-990AEC4334E8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.186
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 213,
"timestamp": "2026-01-06T02:40:00Z",
"transaction_amount_usd": 3111.38
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.479,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1347.03,
"financial_exposure_usd": 1897.2,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100504",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-01T08:24:00Z",
"trace_id": "4a9600b8-e40e-eb67-33bc-3c0734bacebe"
} | {
"account_age_days": 1448,
"account_id": "ACCT-A7C1CA53DCB9",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_2",
"session_entropy": 0.416
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 887,
"timestamp": "2026-01-01T08:24:00Z",
"transaction_amount_usd": 77902.4
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 163970.37,
"financial_exposure_usd": 396297.14,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107317",
"label": "benign",
"label_confidence": 0.534,
"severity": "low",
"timestamp": "2026-01-06T01:57:00Z",
"trace_id": "18e7baea-6e06-5726-8611-e541040b9622"
} | {
"account_age_days": 240,
"account_id": "ACCT-FE4451841469",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_3",
"session_entropy": 0.114
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1198,
"timestamp": "2026-01-06T01:57:00Z",
"transaction_amount_usd": 7456.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.698,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 200.6,
"financial_exposure_usd": 270.17,
"recoverable_pct": 0.873
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100748",
"label": "fraudulent",
"label_confidence": 0.975,
"severity": "high",
"timestamp": "2026-01-01T12:28:00Z",
"trace_id": "5a463aa8-9dd3-c0d3-0fd2-b477c09de425"
} | {
"account_age_days": 873,
"account_id": "ACCT-5E8A93C3ECDC",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_3",
"session_entropy": 0.786
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 339,
"timestamp": "2026-01-01T04:50:00Z",
"transaction_amount_usd": 16.16
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.663,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 459851.18,
"financial_exposure_usd": 655495.96,
"recoverable_pct": 0.559
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101190",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "critical",
"timestamp": "2026-01-01T19:50:00Z",
"trace_id": "d8118fe9-0075-e7b6-dec5-b037f4ca2cf3"
} | {
"account_age_days": 1950,
"account_id": "ACCT-0CA4B69D7B79",
"baseline_risk_score": 0.609,
"kyc_tier": "tier_3",
"session_entropy": 0.585
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 556,
"timestamp": "2026-01-01T19:50:00Z",
"transaction_amount_usd": 85530.13
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.54,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 553177.28,
"financial_exposure_usd": 1116726.13,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105452",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "high",
"timestamp": "2026-01-04T18:52:00Z",
"trace_id": "60fda09e-b5ce-73c4-6304-4ddb85e7125d"
} | {
"account_age_days": 1398,
"account_id": "ACCT-FD6D30E3FFBB",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_3",
"session_entropy": 0.365
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 241,
"timestamp": "2026-01-04T13:44:00Z",
"transaction_amount_usd": 2.15
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.625,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3818356.84,
"financial_exposure_usd": 5248158.56,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100804",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-01T13:24:00Z",
"trace_id": "37a29938-90f3-29dd-9b50-e52092496ed4"
} | {
"account_age_days": 1548,
"account_id": "ACCT-5AC290A567B4",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_1",
"session_entropy": 0.834
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 674,
"timestamp": "2026-01-01T13:24:00Z",
"transaction_amount_usd": 13434.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.77,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 712749.47,
"financial_exposure_usd": 787199.42,
"recoverable_pct": 0.176
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109530",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-07T14:50:00Z",
"trace_id": "f3d20af0-963a-9656-32d6-71117ea2fc38"
} | {
"account_age_days": 680,
"account_id": "ACCT-D0F5E45A71CB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.861
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 238,
"timestamp": "2026-01-07T03:34:00Z",
"transaction_amount_usd": 20.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1553.21,
"financial_exposure_usd": 2773.86,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104151",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "high",
"timestamp": "2026-01-03T21:11:00Z",
"trace_id": "f15e5c91-9b49-cee4-e2de-7d993ca8310e"
} | {
"account_age_days": 770,
"account_id": "ACCT-B322FF40B675",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_3",
"session_entropy": 0.814
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 871,
"timestamp": "2026-01-03T21:11:00Z",
"transaction_amount_usd": 1436717.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.482,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3037892.8,
"financial_exposure_usd": 3534248.58,
"recoverable_pct": 0.953
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104745",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "medium",
"timestamp": "2026-01-04T07:05:00Z",
"trace_id": "f2644629-de5c-46d2-3a1e-263bcc87a207"
} | {
"account_age_days": 1910,
"account_id": "ACCT-EBB786B1B7B1",
"baseline_risk_score": 0.222,
"kyc_tier": "tier_2",
"session_entropy": 0.696
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 477,
"timestamp": "2026-01-04T07:05:00Z",
"transaction_amount_usd": 2298449.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.355,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3401978.6,
"financial_exposure_usd": 6101434.3,
"recoverable_pct": 0.67
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106363",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-05T10:03:00Z",
"trace_id": "3f611c02-7dfe-717b-1908-7dcf79235b4c"
} | {
"account_age_days": 1290,
"account_id": "ACCT-1CA93F5F3923",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_1",
"session_entropy": 0.222
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 468,
"timestamp": "2026-01-05T10:03:00Z",
"transaction_amount_usd": 2063235.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.568,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3610491.65,
"financial_exposure_usd": 7556805.45,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109620",
"label": "benign",
"label_confidence": 0.711,
"severity": "low",
"timestamp": "2026-01-07T16:20:00Z",
"trace_id": "d90991b9-7bc1-b7a1-14b3-75115e185797"
} | {
"account_age_days": 654,
"account_id": "ACCT-B64B1B36229F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.758
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 460,
"timestamp": "2026-01-07T16:20:00Z",
"transaction_amount_usd": 1838.58
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1818.8,
"financial_exposure_usd": 2010.96,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109886",
"label": "benign",
"label_confidence": 0.693,
"severity": "medium",
"timestamp": "2026-01-07T20:46:00Z",
"trace_id": "4f7bebac-bb25-f599-2a8e-9a03ee080911"
} | {
"account_age_days": 215,
"account_id": "ACCT-CEA2FF304749",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.665
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1157,
"timestamp": "2026-01-07T20:46:00Z",
"transaction_amount_usd": 8088.99
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2198.37,
"financial_exposure_usd": 3038.8,
"recoverable_pct": 0.941
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100333",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "high",
"timestamp": "2026-01-01T05:33:00Z",
"trace_id": "779f00d5-571d-7650-2a7a-55500ea20640"
} | {
"account_age_days": 188,
"account_id": "ACCT-2E26D622E17C",
"baseline_risk_score": 0.471,
"kyc_tier": "tier_1",
"session_entropy": 0.649
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1111,
"timestamp": "2026-01-01T05:33:00Z",
"transaction_amount_usd": 115224.18
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.497,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 518123.53,
"financial_exposure_usd": 1145495.97,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107384",
"label": "benign",
"label_confidence": 0.461,
"severity": "medium",
"timestamp": "2026-01-06T03:04:00Z",
"trace_id": "87957911-5f9e-2b08-788f-93556d4d5faa"
} | {
"account_age_days": 1335,
"account_id": "ACCT-E3601D1819FE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.879
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 933,
"timestamp": "2026-01-06T03:04:00Z",
"transaction_amount_usd": 13986.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.488,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3355.66,
"financial_exposure_usd": 7063.77,
"recoverable_pct": 0.848
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106452",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "high",
"timestamp": "2026-01-05T11:32:00Z",
"trace_id": "5e63bbe6-3a21-7b14-2348-33bfc5ceb4fe"
} | {
"account_age_days": 691,
"account_id": "ACCT-FF1C077BE416",
"baseline_risk_score": 0.352,
"kyc_tier": "tier_1",
"session_entropy": 0.922
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 80,
"timestamp": "2026-01-05T11:32:00Z",
"transaction_amount_usd": 1919796.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.818,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3627848.1,
"financial_exposure_usd": 6334170,
"recoverable_pct": 0.489
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103545",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "critical",
"timestamp": "2026-01-03T11:05:00Z",
"trace_id": "4cf5964d-117f-37d7-d79e-2bbfa3d4a03c"
} | {
"account_age_days": 1324,
"account_id": "ACCT-7FD0B52D2031",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_1",
"session_entropy": 0.395
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 443,
"timestamp": "2026-01-03T11:05:00Z",
"transaction_amount_usd": 2095950.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4789294.45,
"financial_exposure_usd": 6859778.14,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101111",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "critical",
"timestamp": "2026-01-01T18:31:00Z",
"trace_id": "08daca13-c671-c92d-71dd-4be5280b6492"
} | {
"account_age_days": 721,
"account_id": "ACCT-B529945FEA47",
"baseline_risk_score": 0.574,
"kyc_tier": "tier_2",
"session_entropy": 0.449
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 269,
"timestamp": "2026-01-01T18:31:00Z",
"transaction_amount_usd": 32892.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.933,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 568810.6,
"financial_exposure_usd": 1041437.75,
"recoverable_pct": 0.1
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105092",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-04T12:52:00Z",
"trace_id": "a69f49cc-9ba9-e11d-0ace-2ca04fedabb6"
} | {
"account_age_days": 1025,
"account_id": "ACCT-1A6334B7ECCB",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_3",
"session_entropy": 0.278
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 751,
"timestamp": "2026-01-04T12:52:00Z",
"transaction_amount_usd": 118201.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.661,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2909908.49,
"financial_exposure_usd": 3964225.76,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106308",
"label": "fraudulent",
"label_confidence": 0.632,
"severity": "critical",
"timestamp": "2026-01-05T09:08:00Z",
"trace_id": "383aa826-ab8f-bfcd-485c-48afd7167e00"
} | {
"account_age_days": 1850,
"account_id": "ACCT-FDBC00CD83BD",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_1",
"session_entropy": 0.891
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1076,
"timestamp": "2026-01-05T09:08:00Z",
"transaction_amount_usd": 955728.74
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.708,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3661531.55,
"financial_exposure_usd": 5121102.18,
"recoverable_pct": 0.772
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103486",
"label": "fraudulent",
"label_confidence": 0.727,
"severity": "high",
"timestamp": "2026-01-03T10:06:00Z",
"trace_id": "f11dd837-413b-4341-c631-27eb443da6ec"
} | {
"account_age_days": 1555,
"account_id": "ACCT-32BA101F4139",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_3",
"session_entropy": 0.91
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 284,
"timestamp": "2026-01-03T05:37:00Z",
"transaction_amount_usd": 5.29
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.81,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3430749.89,
"financial_exposure_usd": 4219118.17,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103200",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "medium",
"timestamp": "2026-01-03T05:20:00Z",
"trace_id": "542272fb-fc2b-8a62-6291-daa5140118be"
} | {
"account_age_days": 1853,
"account_id": "ACCT-847543EA815B",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_1",
"session_entropy": 0.327
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 835,
"timestamp": "2026-01-03T05:20:00Z",
"transaction_amount_usd": 53583.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.949,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 284566.74,
"financial_exposure_usd": 546206.26,
"recoverable_pct": 0.209
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107586",
"label": "benign",
"label_confidence": 0.688,
"severity": "medium",
"timestamp": "2026-01-06T06:26:00Z",
"trace_id": "74976b9b-ab2c-983c-60d1-52a9f824ccbe"
} | {
"account_age_days": 1531,
"account_id": "ACCT-3B2608A9F714",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.845
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 259,
"timestamp": "2026-01-05T21:25:00Z",
"transaction_amount_usd": 5.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.559,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2571.76,
"financial_exposure_usd": 2807.8,
"recoverable_pct": 0.904
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106242",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "high",
"timestamp": "2026-01-05T08:02:00Z",
"trace_id": "139b64ab-f269-006d-faff-ef4a843007f6"
} | {
"account_age_days": 280,
"account_id": "ACCT-707BAB26A1C8",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_3",
"session_entropy": 0.582
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 733,
"timestamp": "2026-01-05T08:02:00Z",
"transaction_amount_usd": 968424.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.491,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3494251.9,
"financial_exposure_usd": 4828663.47,
"recoverable_pct": 0.418
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100486",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "medium",
"timestamp": "2026-01-01T08:06:00Z",
"trace_id": "dccd5aec-8493-e39d-ac10-ba34ad4bd7d8"
} | {
"account_age_days": 1388,
"account_id": "ACCT-4B8243177117",
"baseline_risk_score": 0.476,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1124,
"timestamp": "2026-01-01T08:06:00Z",
"transaction_amount_usd": 10096.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.708,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 520746.11,
"financial_exposure_usd": 677127.28,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106751",
"label": "benign",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-05T16:31:00Z",
"trace_id": "20e686e3-fc09-2789-292c-73cd08e1cd29"
} | {
"account_age_days": 1152,
"account_id": "ACCT-61AE6F2671B5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 366,
"timestamp": "2026-01-05T06:51:00Z",
"transaction_amount_usd": 9.73
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 855.33,
"financial_exposure_usd": 1857.26,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100983",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-01T16:23:00Z",
"trace_id": "b4dbb303-2f92-a806-8b1d-b91d9c1ee1b4"
} | {
"account_age_days": 1532,
"account_id": "ACCT-957C63061437",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.793
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 969,
"timestamp": "2026-01-01T16:23:00Z",
"transaction_amount_usd": 34342.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.816,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 225600.75,
"financial_exposure_usd": 233574,
"recoverable_pct": 0.213
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100398",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "critical",
"timestamp": "2026-01-01T06:38:00Z",
"trace_id": "cf11be94-02a6-727c-0d16-192b515b1487"
} | {
"account_age_days": 1599,
"account_id": "ACCT-85E17C3C6301",
"baseline_risk_score": 0.524,
"kyc_tier": "tier_3",
"session_entropy": 0.203
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 364,
"timestamp": "2026-01-01T03:14:00Z",
"transaction_amount_usd": 6.1
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.483,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 332767.99,
"financial_exposure_usd": 613357.18,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109664",
"label": "benign",
"label_confidence": 0.608,
"severity": "low",
"timestamp": "2026-01-07T17:04:00Z",
"trace_id": "00fd0594-1784-d18c-ccea-bbafd89a08c1"
} | {
"account_age_days": 1343,
"account_id": "ACCT-4F630FC43F54",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.75
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1134,
"timestamp": "2026-01-07T17:04:00Z",
"transaction_amount_usd": 3676.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2450.03,
"financial_exposure_usd": 2458.67,
"recoverable_pct": 0.423
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104383",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "high",
"timestamp": "2026-01-04T01:03:00Z",
"trace_id": "cfbcb3f5-0fb5-8513-5e02-f37e4e31c75a"
} | {
"account_age_days": 1125,
"account_id": "ACCT-1980209CC54E",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_3",
"session_entropy": 0.78
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 178,
"timestamp": "2026-01-03T18:05:00Z",
"transaction_amount_usd": 23.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.422,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2003444.76,
"financial_exposure_usd": 4298061.73,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108365",
"label": "benign",
"label_confidence": 0.509,
"severity": "medium",
"timestamp": "2026-01-06T19:25:00Z",
"trace_id": "548100bf-7b6c-2c9b-76e1-0e22244d18ad"
} | {
"account_age_days": 1534,
"account_id": "ACCT-B0F576F619BF",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_3",
"session_entropy": 0.866
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 484,
"timestamp": "2026-01-06T19:25:00Z",
"transaction_amount_usd": 12423.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 859.01,
"financial_exposure_usd": 1244.39,
"recoverable_pct": 0.862
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104578",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "low",
"timestamp": "2026-01-04T04:18:00Z",
"trace_id": "62a673c1-d183-137a-6236-8ebdbae7ff25"
} | {
"account_age_days": 961,
"account_id": "ACCT-C6E9341A213F",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_2",
"session_entropy": 0.689
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 466,
"timestamp": "2026-01-04T04:18:00Z",
"transaction_amount_usd": 697921.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5267861.39,
"financial_exposure_usd": 5508686.62,
"recoverable_pct": 0.75
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100541",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "high",
"timestamp": "2026-01-01T09:01:00Z",
"trace_id": "20c06aed-64b2-5499-ad5a-01104a908514"
} | {
"account_age_days": 1983,
"account_id": "ACCT-79037F06745B",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_1",
"session_entropy": 0.145
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 148,
"timestamp": "2026-01-01T00:36:00Z",
"transaction_amount_usd": 22.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.695,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 771013.93,
"financial_exposure_usd": 1170515.47,
"recoverable_pct": 0.226
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108187",
"label": "benign",
"label_confidence": 0.663,
"severity": "high",
"timestamp": "2026-01-06T16:27:00Z",
"trace_id": "ec47e681-3b5f-b9fc-1e2a-ed26c07f29dc"
} | {
"account_age_days": 698,
"account_id": "ACCT-A155505B3DFB",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_3",
"session_entropy": 0.568
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 401,
"timestamp": "2026-01-06T16:27:00Z",
"transaction_amount_usd": 4731.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1621.81,
"financial_exposure_usd": 3544.93,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105619",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-04T21:39:00Z",
"trace_id": "345877d0-ef27-ab5d-25c3-ec2f36e3b9c2"
} | {
"account_age_days": 631,
"account_id": "ACCT-043F9464D6C5",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_1",
"session_entropy": 0.538
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 127,
"timestamp": "2026-01-04T21:39:00Z",
"transaction_amount_usd": 1284733.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.529,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1785612.55,
"financial_exposure_usd": 1824433.73,
"recoverable_pct": 0.869
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101861",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-02T07:01:00Z",
"trace_id": "67a57dd8-0a18-fa2d-2527-2424ae60ac67"
} | {
"account_age_days": 552,
"account_id": "ACCT-867B0CA3290E",
"baseline_risk_score": 0.469,
"kyc_tier": "tier_2",
"session_entropy": 0.787
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 318,
"timestamp": "2026-01-02T07:01:00Z",
"transaction_amount_usd": 102427.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.772,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 298625.46,
"financial_exposure_usd": 485894.55,
"recoverable_pct": 0.098
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106559",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "high",
"timestamp": "2026-01-05T13:19:00Z",
"trace_id": "473a650a-1592-4e3e-a799-564904ce7c57"
} | {
"account_age_days": 274,
"account_id": "ACCT-FF55E33EB562",
"baseline_risk_score": 0.18,
"kyc_tier": "tier_2",
"session_entropy": 0.904
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 608,
"timestamp": "2026-01-05T13:19:00Z",
"transaction_amount_usd": 1626297.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.632,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1470173.05,
"financial_exposure_usd": 2760911.22,
"recoverable_pct": 0.959
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103822",
"label": "fraudulent",
"label_confidence": 0.876,
"severity": "low",
"timestamp": "2026-01-03T15:42:00Z",
"trace_id": "a1505ee3-de31-0e2d-d420-4714fcb47b51"
} | {
"account_age_days": 1032,
"account_id": "ACCT-BE7902C21758",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_1",
"session_entropy": 0.58
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 518,
"timestamp": "2026-01-03T15:42:00Z",
"transaction_amount_usd": 567914.6
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.691,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1041317.42,
"financial_exposure_usd": 1219478.87,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100943",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-01T15:43:00Z",
"trace_id": "5afb975d-95bb-1c32-c16b-a3e1e21a5a87"
} | {
"account_age_days": 477,
"account_id": "ACCT-710C2571F046",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_3",
"session_entropy": 0.746
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 923,
"timestamp": "2026-01-01T15:43:00Z",
"transaction_amount_usd": 20091.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.353,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 382460.34,
"financial_exposure_usd": 634034.91,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102020",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "critical",
"timestamp": "2026-01-02T09:40:00Z",
"trace_id": "6bef6d83-ebf7-4f6b-8ead-59cf617bedda"
} | {
"account_age_days": 1694,
"account_id": "ACCT-AAD7AA20C9B7",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_2",
"session_entropy": 0.439
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 983,
"timestamp": "2026-01-02T09:40:00Z",
"transaction_amount_usd": 70608.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 215076.46,
"financial_exposure_usd": 257471.42,
"recoverable_pct": 0.685
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105811",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-05T00:51:00Z",
"trace_id": "f69ac76d-92ac-5d9f-bb73-89c69587e1cc"
} | {
"account_age_days": 995,
"account_id": "ACCT-57E127FC1D91",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_3",
"session_entropy": 0.565
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 123,
"timestamp": "2026-01-05T00:51:00Z",
"transaction_amount_usd": 418887.32
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.827,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2279461.88,
"financial_exposure_usd": 2770002.84,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109791",
"label": "benign",
"label_confidence": 0.724,
"severity": "high",
"timestamp": "2026-01-07T19:11:00Z",
"trace_id": "6fc6bd72-f481-04b7-6d39-dc5a131e180a"
} | {
"account_age_days": 653,
"account_id": "ACCT-9541C65E96BD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.342
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 310,
"timestamp": "2026-01-07T10:18:00Z",
"transaction_amount_usd": 22.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.491,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2037.7,
"financial_exposure_usd": 2294.6,
"recoverable_pct": 0.998
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102927",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "medium",
"timestamp": "2026-01-03T00:47:00Z",
"trace_id": "4d74f252-465f-69bb-8e15-fc1e507589cf"
} | {
"account_age_days": 1828,
"account_id": "ACCT-133C77BABEA5",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_2",
"session_entropy": 0.923
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 430,
"timestamp": "2026-01-03T00:47:00Z",
"transaction_amount_usd": 37896.96
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.439,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 503690.97,
"financial_exposure_usd": 658672.19,
"recoverable_pct": 0.077
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100390",
"label": "fraudulent",
"label_confidence": 0.881,
"severity": "critical",
"timestamp": "2026-01-01T06:30:00Z",
"trace_id": "ee0bde13-7f48-266c-6ec2-2d019ce53da9"
} | {
"account_age_days": 1947,
"account_id": "ACCT-A4C1BF917292",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_2",
"session_entropy": 0.438
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 335,
"timestamp": "2026-01-01T06:30:00Z",
"transaction_amount_usd": 74438.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.451,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 552603.44,
"financial_exposure_usd": 814713.18,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105505",
"label": "fraudulent",
"label_confidence": 0.73,
"severity": "high",
"timestamp": "2026-01-04T19:45:00Z",
"trace_id": "50eb6e51-9079-634e-e77d-e363d42b864e"
} | {
"account_age_days": 1404,
"account_id": "ACCT-951E19B65DD1",
"baseline_risk_score": 0.159,
"kyc_tier": "tier_2",
"session_entropy": 0.207
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 400,
"timestamp": "2026-01-04T15:33:00Z",
"transaction_amount_usd": 16.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 150131.93,
"financial_exposure_usd": 153421.95,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108486",
"label": "benign",
"label_confidence": 0.609,
"severity": "medium",
"timestamp": "2026-01-06T21:26:00Z",
"trace_id": "c3871858-a874-e508-22ae-fb901fe5f8e4"
} | {
"account_age_days": 1632,
"account_id": "ACCT-CD339759645C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.106
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 348,
"timestamp": "2026-01-06T21:26:00Z",
"transaction_amount_usd": 1677.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.467,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 951.75,
"financial_exposure_usd": 2352.3,
"recoverable_pct": 0.547
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106148",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-05T06:28:00Z",
"trace_id": "32e0ce31-bda0-c5cd-bbdd-7c1dc41af981"
} | {
"account_age_days": 1529,
"account_id": "ACCT-D8EEF7DE52C9",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_2",
"session_entropy": 0.355
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 314,
"timestamp": "2026-01-05T06:28:00Z",
"transaction_amount_usd": 637374.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.579,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 418530.85,
"financial_exposure_usd": 743774.02,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102730",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "high",
"timestamp": "2026-01-02T21:30:00Z",
"trace_id": "35a9a181-7fe2-d463-e80c-91d32020c959"
} | {
"account_age_days": 276,
"account_id": "ACCT-86AF79AB241B",
"baseline_risk_score": 0.277,
"kyc_tier": "tier_3",
"session_entropy": 0.632
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 420,
"timestamp": "2026-01-02T21:30:00Z",
"transaction_amount_usd": 107005.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.746,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 679892.4,
"financial_exposure_usd": 1136434.56,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107325",
"label": "benign",
"label_confidence": 0.723,
"severity": "medium",
"timestamp": "2026-01-06T02:05:00Z",
"trace_id": "748889a8-5990-aab4-613f-25a15603e657"
} | {
"account_age_days": 1876,
"account_id": "ACCT-3D9CF7BAA28C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.713
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 621,
"timestamp": "2026-01-06T02:05:00Z",
"transaction_amount_usd": 9945.8
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2293.68,
"financial_exposure_usd": 3085.06,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108906",
"label": "benign",
"label_confidence": 0.596,
"severity": "high",
"timestamp": "2026-01-07T04:26:00Z",
"trace_id": "f73bdf79-ed73-edd3-9599-ef0caccd35f1"
} | {
"account_age_days": 562,
"account_id": "ACCT-E6D0EDC8F813",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_1",
"session_entropy": 0.816
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 397,
"timestamp": "2026-01-07T04:26:00Z",
"transaction_amount_usd": 8566.33
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1285.94,
"financial_exposure_usd": 1847.87,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102246",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "critical",
"timestamp": "2026-01-02T13:26:00Z",
"trace_id": "5c57649b-56ab-bf7a-b105-61298acdb5e1"
} | {
"account_age_days": 144,
"account_id": "ACCT-FF632BD3F922",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_3",
"session_entropy": 0.346
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 357,
"timestamp": "2026-01-02T11:03:00Z",
"transaction_amount_usd": 19.91
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.654,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 443223.53,
"financial_exposure_usd": 562776.76,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101587",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "critical",
"timestamp": "2026-01-02T02:27:00Z",
"trace_id": "da518225-fa6f-2f3a-444d-c21cffe6ba54"
} | {
"account_age_days": 261,
"account_id": "ACCT-C0F20923F093",
"baseline_risk_score": 0.341,
"kyc_tier": "tier_1",
"session_entropy": 0.232
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 211,
"timestamp": "2026-01-02T02:27:00Z",
"transaction_amount_usd": 61227.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 452979.14,
"financial_exposure_usd": 720480.78,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101810",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "low",
"timestamp": "2026-01-02T06:10:00Z",
"trace_id": "4cdaffc0-3086-2df7-429d-4d8dbdac8aee"
} | {
"account_age_days": 1558,
"account_id": "ACCT-493C4D0E06D9",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_3",
"session_entropy": 0.706
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 302,
"timestamp": "2026-01-01T21:49:00Z",
"transaction_amount_usd": 11.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.426,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.09
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102176",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "high",
"timestamp": "2026-01-02T12:16:00Z",
"trace_id": "0456b218-8cbc-4f76-ebb9-baec356f324a"
} | {
"account_age_days": 1329,
"account_id": "ACCT-846302DF0CC3",
"baseline_risk_score": 0.563,
"kyc_tier": "tier_3",
"session_entropy": 0.759
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 336,
"timestamp": "2026-01-02T11:27:00Z",
"transaction_amount_usd": 5.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.749,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 513059.97,
"financial_exposure_usd": 952235.77,
"recoverable_pct": 0.427
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109283",
"label": "benign",
"label_confidence": 0.628,
"severity": "medium",
"timestamp": "2026-01-07T10:43:00Z",
"trace_id": "25d03ff1-c26f-b42c-27b9-b4103c8cf89e"
} | {
"account_age_days": 202,
"account_id": "ACCT-1AEF7CC0BC9F",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.924
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 379,
"timestamp": "2026-01-07T10:43:00Z",
"transaction_amount_usd": 8760
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.788,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1285.24,
"financial_exposure_usd": 1421.68,
"recoverable_pct": 0.952
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102680",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "critical",
"timestamp": "2026-01-02T20:40:00Z",
"trace_id": "6cd66a45-8b5e-c209-b453-a32063cd48ec"
} | {
"account_age_days": 1760,
"account_id": "ACCT-06E7A8EC0E11",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_1",
"session_entropy": 0.813
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 900,
"timestamp": "2026-01-02T20:40:00Z",
"transaction_amount_usd": 59911.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.572,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 131728.03,
"financial_exposure_usd": 144118.37,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102486",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "medium",
"timestamp": "2026-01-02T17:26:00Z",
"trace_id": "0a18c2fa-31d0-947f-df98-92e44a3fc80d"
} | {
"account_age_days": 1561,
"account_id": "ACCT-ACE1259CCD31",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.573
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 710,
"timestamp": "2026-01-02T17:26:00Z",
"transaction_amount_usd": 19829.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.755,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 621747.37,
"financial_exposure_usd": 973576.3,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101398",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-01T23:18:00Z",
"trace_id": "f8968107-d1c6-20a8-a56a-a8be74ec4476"
} | {
"account_age_days": 338,
"account_id": "ACCT-F8DC5A0C93BF",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_3",
"session_entropy": 0.356
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 92,
"timestamp": "2026-01-01T23:18:00Z",
"transaction_amount_usd": 38256.22
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.932,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 634392.83,
"financial_exposure_usd": 1072321.54,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104785",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "low",
"timestamp": "2026-01-04T07:45:00Z",
"trace_id": "5eb76c4b-7757-4f24-f8a3-6a26d66f7240"
} | {
"account_age_days": 1158,
"account_id": "ACCT-85F0EE758AD1",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.829
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 400,
"timestamp": "2026-01-04T01:07:00Z",
"transaction_amount_usd": 22.78
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.532,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3187054,
"financial_exposure_usd": 6558853.02,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106893",
"label": "benign",
"label_confidence": 0.689,
"severity": "medium",
"timestamp": "2026-01-05T18:53:00Z",
"trace_id": "8102a077-d0b2-e0f1-4a90-351a6da45f88"
} | {
"account_age_days": 419,
"account_id": "ACCT-3E67539222CB",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_2",
"session_entropy": 0.264
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 354,
"timestamp": "2026-01-05T18:53:00Z",
"transaction_amount_usd": 7823.47
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2997.41,
"financial_exposure_usd": 3962.2,
"recoverable_pct": 0.496
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107214",
"label": "benign",
"label_confidence": 0.601,
"severity": "critical",
"timestamp": "2026-01-06T00:14:00Z",
"trace_id": "b83fa0a8-cc4c-2b76-9eec-6d386d846d07"
} | {
"account_age_days": 711,
"account_id": "ACCT-B792CF9B49AA",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1196,
"timestamp": "2026-01-06T00:14:00Z",
"transaction_amount_usd": 3701.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.733,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5432.81,
"financial_exposure_usd": 5530.44,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108395",
"label": "benign",
"label_confidence": 0.499,
"severity": "low",
"timestamp": "2026-01-06T19:55:00Z",
"trace_id": "3973764f-c0e3-cc1f-46b4-c771303ca78a"
} | {
"account_age_days": 36,
"account_id": "ACCT-62F7B1D34169",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.475
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 717,
"timestamp": "2026-01-06T19:55:00Z",
"transaction_amount_usd": 7041.67
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.511,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 624.89,
"financial_exposure_usd": 1040.26,
"recoverable_pct": 0.616
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109720",
"label": "benign",
"label_confidence": 0.657,
"severity": "high",
"timestamp": "2026-01-07T18:00:00Z",
"trace_id": "9fb03d6f-4539-211a-d9cc-10730f7b427b"
} | {
"account_age_days": 707,
"account_id": "ACCT-B26C86E78EE3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.662
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 129,
"timestamp": "2026-01-07T14:40:00Z",
"transaction_amount_usd": 8.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.603,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1471.62,
"financial_exposure_usd": 2986.46,
"recoverable_pct": 0.945
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107891",
"label": "benign",
"label_confidence": 0.584,
"severity": "low",
"timestamp": "2026-01-06T11:31:00Z",
"trace_id": "29f1fec2-e466-92e1-a367-6dd0f7456f86"
} | {
"account_age_days": 648,
"account_id": "ACCT-53EC3231C6C1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.202
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 100,
"timestamp": "2026-01-06T07:14:00Z",
"transaction_amount_usd": 19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.589,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2260,
"financial_exposure_usd": 2736.05,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105172",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "medium",
"timestamp": "2026-01-04T14:12:00Z",
"trace_id": "921535bd-b05a-0855-d3a3-3131b6a008b4"
} | {
"account_age_days": 339,
"account_id": "ACCT-0B115947D6E0",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_3",
"session_entropy": 0.235
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 587,
"timestamp": "2026-01-04T14:12:00Z",
"transaction_amount_usd": 899538.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.809,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2895034.76,
"financial_exposure_usd": 5027877.6,
"recoverable_pct": 0.809
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108083",
"label": "benign",
"label_confidence": 0.534,
"severity": "high",
"timestamp": "2026-01-06T14:43:00Z",
"trace_id": "fcd9aae5-a899-6719-11e3-580248e1e987"
} | {
"account_age_days": 766,
"account_id": "ACCT-DF44866E34B8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.242
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 284,
"timestamp": "2026-01-06T06:48:00Z",
"transaction_amount_usd": 15.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.474,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 527.98,
"financial_exposure_usd": 649.17,
"recoverable_pct": 0.645
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107933",
"label": "benign",
"label_confidence": 0.548,
"severity": "medium",
"timestamp": "2026-01-06T12:13:00Z",
"trace_id": "fd25d5cb-28f4-f4cf-a496-0ca329a5647a"
} | {
"account_age_days": 710,
"account_id": "ACCT-E1BCDD26066B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.783
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 98,
"timestamp": "2026-01-06T12:13:00Z",
"transaction_amount_usd": 11294.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3414.88,
"financial_exposure_usd": 4118.71,
"recoverable_pct": 0.844
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100341",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "high",
"timestamp": "2026-01-01T05:41:00Z",
"trace_id": "008f03ca-8a32-c05e-6b40-335213445e51"
} | {
"account_age_days": 1901,
"account_id": "ACCT-67B29AEC738B",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_3",
"session_entropy": 0.799
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 431,
"timestamp": "2026-01-01T05:41:00Z",
"transaction_amount_usd": 82408.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id H... | {
"customer_funds_at_risk_usd": 278171.11,
"financial_exposure_usd": 352376.21,
"recoverable_pct": 0.382
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103883",
"label": "fraudulent",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-03T16:43:00Z",
"trace_id": "53b0e567-71e7-d333-f370-d35a3d30e8b2"
} | {
"account_age_days": 104,
"account_id": "ACCT-E3D85D370D6C",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_1",
"session_entropy": 0.463
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 687,
"timestamp": "2026-01-03T16:43:00Z",
"transaction_amount_usd": 777200.06
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.634,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7202997.56,
"financial_exposure_usd": 8535057.87,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104449",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "medium",
"timestamp": "2026-01-04T02:09:00Z",
"trace_id": "a10ff8cc-e973-f9d0-0b07-0ed2a628b121"
} | {
"account_age_days": 1100,
"account_id": "ACCT-6ACC5A8F1FE0",
"baseline_risk_score": 0.091,
"kyc_tier": "tier_2",
"session_entropy": 0.273
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 214,
"timestamp": "2026-01-04T02:09:00Z",
"transaction_amount_usd": 2848404.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.667,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2183635.71,
"financial_exposure_usd": 3319925.38,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104374",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "high",
"timestamp": "2026-01-04T00:54:00Z",
"trace_id": "0cdeda43-a0d2-b819-074e-6ea2915f4419"
} | {
"account_age_days": 507,
"account_id": "ACCT-13EAA02D2F69",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_3",
"session_entropy": 0.592
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 178,
"timestamp": "2026-01-03T21:40:00Z",
"transaction_amount_usd": 3.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4755249.5,
"financial_exposure_usd": 7395750.24,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103526",
"label": "fraudulent",
"label_confidence": 0.715,
"severity": "medium",
"timestamp": "2026-01-03T10:46:00Z",
"trace_id": "7548f756-120e-605a-0d76-55e4c9bada19"
} | {
"account_age_days": 325,
"account_id": "ACCT-0F2485176835",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_3",
"session_entropy": 0.944
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1141,
"timestamp": "2026-01-03T10:46:00Z",
"transaction_amount_usd": 2965966.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.835,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4159168.24,
"financial_exposure_usd": 4531312.15,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105593",
"label": "fraudulent",
"label_confidence": 0.665,
"severity": "low",
"timestamp": "2026-01-04T21:13:00Z",
"trace_id": "d7a68cbd-91dc-3fb6-abd7-2e4a988d5e94"
} | {
"account_age_days": 669,
"account_id": "ACCT-81E158C164F1",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.407
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 129,
"timestamp": "2026-01-04T12:49:00Z",
"transaction_amount_usd": 16.14
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.868,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4474787.06,
"financial_exposure_usd": 5953312.51,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101169",
"label": "fraudulent",
"label_confidence": 0.953,
"severity": "critical",
"timestamp": "2026-01-01T19:29:00Z",
"trace_id": "7144380b-0436-9592-7989-6384febbfd51"
} | {
"account_age_days": 1635,
"account_id": "ACCT-0A4609DA9B49",
"baseline_risk_score": 0.473,
"kyc_tier": "tier_2",
"session_entropy": 0.595
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 259,
"timestamp": "2026-01-01T19:29:00Z",
"transaction_amount_usd": 27858
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 582978.26,
"financial_exposure_usd": 692806.15,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100771",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-01T12:51:00Z",
"trace_id": "03ac34f8-2158-9df4-a338-2729cd4ebad8"
} | {
"account_age_days": 1031,
"account_id": "ACCT-4131D33E3290",
"baseline_risk_score": 0.576,
"kyc_tier": "tier_3",
"session_entropy": 0.242
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 223,
"timestamp": "2026-01-01T08:09:00Z",
"transaction_amount_usd": 18.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.477,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 822105.17,
"financial_exposure_usd": 1153548.92,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107361",
"label": "benign",
"label_confidence": 0.521,
"severity": "low",
"timestamp": "2026-01-06T02:41:00Z",
"trace_id": "c64e07cf-f4e6-136f-b991-9abc856f009d"
} | {
"account_age_days": 1211,
"account_id": "ACCT-CF0A51BA0B38",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.519
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 135,
"timestamp": "2026-01-05T18:08:00Z",
"transaction_amount_usd": 2.58
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1117.95,
"financial_exposure_usd": 1703.48,
"recoverable_pct": 0.76
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105938",
"label": "fraudulent",
"label_confidence": 0.703,
"severity": "low",
"timestamp": "2026-01-05T02:58:00Z",
"trace_id": "8e910647-5e1d-ff96-61b4-33594aa00619"
} | {
"account_age_days": 1311,
"account_id": "ACCT-8B0D313112FB",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_3",
"session_entropy": 0.769
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 815,
"timestamp": "2026-01-05T02:58:00Z",
"transaction_amount_usd": 1727577.59
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.702,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2377449.65,
"financial_exposure_usd": 5855579.44,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108265",
"label": "benign",
"label_confidence": 0.542,
"severity": "low",
"timestamp": "2026-01-06T17:45:00Z",
"trace_id": "0b7d307d-35e1-7475-1c3d-5394da6e5236"
} | {
"account_age_days": 1594,
"account_id": "ACCT-0D1B3721D0D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.549
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 918,
"timestamp": "2026-01-06T17:45:00Z",
"transaction_amount_usd": 8868.62
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.729,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1332.14,
"financial_exposure_usd": 1654.73,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105163",
"label": "fraudulent",
"label_confidence": 0.683,
"severity": "low",
"timestamp": "2026-01-04T14:03:00Z",
"trace_id": "98767c82-764f-2c74-de66-7535b29abb8a"
} | {
"account_age_days": 1600,
"account_id": "ACCT-A8CB16C81275",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_3",
"session_entropy": 0.902
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 233,
"timestamp": "2026-01-04T03:50:00Z",
"transaction_amount_usd": 11.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.556,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 939093.23,
"financial_exposure_usd": 2036476.47,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100375",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-01T06:15:00Z",
"trace_id": "b340e35d-a3b9-fb3d-1e1e-fa474a0d7cd8"
} | {
"account_age_days": 1488,
"account_id": "ACCT-D2EB985F38CF",
"baseline_risk_score": 0.484,
"kyc_tier": "tier_3",
"session_entropy": 0.662
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1153,
"timestamp": "2026-01-01T06:15:00Z",
"transaction_amount_usd": 58980.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.5,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1159548.24,
"financial_exposure_usd": 1298178.69,
"recoverable_pct": 0.342
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104701",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "high",
"timestamp": "2026-01-04T06:21:00Z",
"trace_id": "dc8f937d-c8de-d277-7e6b-dca9e4c6828c"
} | {
"account_age_days": 1450,
"account_id": "ACCT-692697558C3B",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_3",
"session_entropy": 0.622
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 965,
"timestamp": "2026-01-04T06:21:00Z",
"transaction_amount_usd": 1886934.44
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.749,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3792352.87,
"financial_exposure_usd": 5907313.77,
"recoverable_pct": 0.494
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109957",
"label": "benign",
"label_confidence": 0.65,
"severity": "low",
"timestamp": "2026-01-07T21:57:00Z",
"trace_id": "66495730-39cd-8141-f642-213dd8ed2bc7"
} | {
"account_age_days": 761,
"account_id": "ACCT-180A4D4B8988",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.259
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 758,
"timestamp": "2026-01-07T21:57:00Z",
"transaction_amount_usd": 14099.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.451,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2771.21,
"financial_exposure_usd": 2987.77,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104135",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "high",
"timestamp": "2026-01-03T20:55:00Z",
"trace_id": "1748c2f7-2f19-d4c7-2ab2-191923de0994"
} | {
"account_age_days": 294,
"account_id": "ACCT-7A6D9C7F6FF1",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_1",
"session_entropy": 0.542
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 145,
"timestamp": "2026-01-03T18:28:00Z",
"transaction_amount_usd": 6.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1693564.46,
"financial_exposure_usd": 2552733.82,
"recoverable_pct": 0.977
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100054",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "medium",
"timestamp": "2026-01-01T00:54:00Z",
"trace_id": "c9c04b7d-6ba4-170b-4e9d-23e9df162ec3"
} | {
"account_age_days": 267,
"account_id": "ACCT-E0821918B18A",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_1",
"session_entropy": 0.393
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 225,
"timestamp": "2026-01-01T00:54:00Z",
"transaction_amount_usd": 70475.7
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.652,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 217829.03,
"financial_exposure_usd": 435473.32,
"recoverable_pct": 0.7
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100476",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "medium",
"timestamp": "2026-01-01T07:56:00Z",
"trace_id": "9caf6869-92c5-d3fb-db5d-c575c27b2f57"
} | {
"account_age_days": 1745,
"account_id": "ACCT-2FBEBC777E2D",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.221
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 107,
"timestamp": "2026-01-01T07:56:00Z",
"transaction_amount_usd": 25090.02
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.853,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 566381.01,
"financial_exposure_usd": 697910.61,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107800",
"label": "benign",
"label_confidence": 0.588,
"severity": "medium",
"timestamp": "2026-01-06T10:00:00Z",
"trace_id": "d8115fab-6b15-7ac0-7a9c-3758b8098f45"
} | {
"account_age_days": 1572,
"account_id": "ACCT-B15DD066D272",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.841
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 392,
"timestamp": "2026-01-06T02:51:00Z",
"transaction_amount_usd": 1.63
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 852.78,
"financial_exposure_usd": 2118.2,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103619",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "high",
"timestamp": "2026-01-03T12:19:00Z",
"trace_id": "c483c792-7513-9928-fc93-b7a8ec4edda1"
} | {
"account_age_days": 723,
"account_id": "ACCT-2313DCDEBE3D",
"baseline_risk_score": 0.081,
"kyc_tier": "tier_1",
"session_entropy": 0.236
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 133,
"timestamp": "2026-01-03T08:07:00Z",
"transaction_amount_usd": 16.7
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.49,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3008896.93,
"financial_exposure_usd": 4540830.79,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101472",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "critical",
"timestamp": "2026-01-02T00:32:00Z",
"trace_id": "22beb2c2-e12e-3431-3444-20d6a9c0c0c5"
} | {
"account_age_days": 1631,
"account_id": "ACCT-4B79D0C2D55E",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_3",
"session_entropy": 0.853
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 276,
"timestamp": "2026-01-01T15:17:00Z",
"transaction_amount_usd": 1.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.902,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 290522.98,
"financial_exposure_usd": 547572.11,
"recoverable_pct": 0.472
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103602",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "low",
"timestamp": "2026-01-03T12:02:00Z",
"trace_id": "6cb6e75f-2aaa-db39-f647-60b9dbfc1bd3"
} | {
"account_age_days": 1987,
"account_id": "ACCT-51016032CC95",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.456
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 128,
"timestamp": "2026-01-03T12:02:00Z",
"transaction_amount_usd": 2305873.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.63,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2175923.04,
"financial_exposure_usd": 4349978.93,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107395",
"label": "benign",
"label_confidence": 0.506,
"severity": "low",
"timestamp": "2026-01-06T03:15:00Z",
"trace_id": "40de6815-8090-dfbb-2cfb-cdbe6afa0375"
} | {
"account_age_days": 1322,
"account_id": "ACCT-C4837667574B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.774
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 792,
"timestamp": "2026-01-06T03:15:00Z",
"transaction_amount_usd": 10040.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.78,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 291.63,
"financial_exposure_usd": 390.38,
"recoverable_pct": 0.675
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108582",
"label": "benign",
"label_confidence": 0.742,
"severity": "medium",
"timestamp": "2026-01-06T23:02:00Z",
"trace_id": "7fb5dc36-127b-5102-95b5-e4fd908d2419"
} | {
"account_age_days": 627,
"account_id": "ACCT-72DB9C764E89",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_3",
"session_entropy": 0.231
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1027,
"timestamp": "2026-01-06T23:02:00Z",
"transaction_amount_usd": 4083.94
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5180.14,
"financial_exposure_usd": 6626.93,
"recoverable_pct": 0.698
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103969",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-03T18:09:00Z",
"trace_id": "8e663e23-6896-8549-7d6e-b009375c1d9a"
} | {
"account_age_days": 515,
"account_id": "ACCT-44EF39C2CC6C",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_2",
"session_entropy": 0.694
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1137,
"timestamp": "2026-01-03T18:09:00Z",
"transaction_amount_usd": 2139322.25
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.384,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2211731.73,
"financial_exposure_usd": 3011191.56,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108865",
"label": "benign",
"label_confidence": 0.6,
"severity": "low",
"timestamp": "2026-01-07T03:45:00Z",
"trace_id": "80c254a4-c233-79e1-d600-300941e9951d"
} | {
"account_age_days": 1777,
"account_id": "ACCT-38C873264727",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.939
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 487,
"timestamp": "2026-01-07T03:45:00Z",
"transaction_amount_usd": 6855.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.778,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 952.97,
"financial_exposure_usd": 1047.87,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105651",
"label": "fraudulent",
"label_confidence": 0.667,
"severity": "high",
"timestamp": "2026-01-04T22:11:00Z",
"trace_id": "45364738-b61a-f119-4554-66028c5e2005"
} | {
"account_age_days": 942,
"account_id": "ACCT-186B3F0C7BAF",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_2",
"session_entropy": 0.591
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 514,
"timestamp": "2026-01-04T22:11:00Z",
"transaction_amount_usd": 2153313.53
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.557,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3293778.81,
"financial_exposure_usd": 4800431.81,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100417",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "high",
"timestamp": "2026-01-01T06:57:00Z",
"trace_id": "b14d94c0-662d-ffb1-cdfd-1fe9f461eef8"
} | {
"account_age_days": 1263,
"account_id": "ACCT-14636298E1D8",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_1",
"session_entropy": 0.741
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1109,
"timestamp": "2026-01-01T06:57:00Z",
"transaction_amount_usd": 5478.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.655,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 728159.58,
"financial_exposure_usd": 1218549.49,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100895",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "critical",
"timestamp": "2026-01-01T14:55:00Z",
"trace_id": "8f733b58-d6ec-d10f-6c7d-f54b285cf32c"
} | {
"account_age_days": 618,
"account_id": "ACCT-D7D306135F96",
"baseline_risk_score": 0.58,
"kyc_tier": "tier_3",
"session_entropy": 0.137
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 356,
"timestamp": "2026-01-01T09:20:00Z",
"transaction_amount_usd": 19.6
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.794,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 779169.06,
"financial_exposure_usd": 1137746.77,
"recoverable_pct": 0.779
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107465",
"label": "benign",
"label_confidence": 0.499,
"severity": "low",
"timestamp": "2026-01-06T04:25:00Z",
"trace_id": "47833866-d60a-af34-402a-3eb9a7335a23"
} | {
"account_age_days": 498,
"account_id": "ACCT-5408D787A781",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.876
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 231,
"timestamp": "2026-01-05T20:25:00Z",
"transaction_amount_usd": 22.64
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.785,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1346.47,
"financial_exposure_usd": 2223.58,
"recoverable_pct": 0.769
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102127",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-02T11:27:00Z",
"trace_id": "b8b47597-67ec-0737-7439-25b92b707625"
} | {
"account_age_days": 1585,
"account_id": "ACCT-C297AE1C212A",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 132,
"timestamp": "2026-01-02T11:27:00Z",
"transaction_amount_usd": 14034.34
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 446855.59,
"financial_exposure_usd": 578908.2,
"recoverable_pct": 0.692
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102949",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "high",
"timestamp": "2026-01-03T01:09:00Z",
"trace_id": "838d9259-b734-4841-e5fb-3d4f17203609"
} | {
"account_age_days": 1797,
"account_id": "ACCT-ACBAB0225AE8",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_2",
"session_entropy": 0.635
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1167,
"timestamp": "2026-01-03T01:09:00Z",
"transaction_amount_usd": 2740.73
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.627,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1183202.83,
"financial_exposure_usd": 1254420.49,
"recoverable_pct": 0.758
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.