schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106986",
"label": "benign",
"label_confidence": 0.546,
"severity": "low",
"timestamp": "2026-01-05T20:26:00Z",
"trace_id": "68ed359c-6e93-4833-0fb6-02321ee30108"
} | {
"account_age_days": 523,
"account_id": "ACCT-892B0622D12E",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_1",
"session_entropy": 0.208
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 324,
"timestamp": "2026-01-05T17:39:00Z",
"transaction_amount_usd": 20.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.73,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1828.1,
"financial_exposure_usd": 3472.71,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107060",
"label": "benign",
"label_confidence": 0.565,
"severity": "low",
"timestamp": "2026-01-05T21:40:00Z",
"trace_id": "af119521-6313-0342-533e-62c239bb979a"
} | {
"account_age_days": 1259,
"account_id": "ACCT-1B87EF6AEA84",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.543
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1061,
"timestamp": "2026-01-05T21:40:00Z",
"transaction_amount_usd": 5136.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 906.7,
"financial_exposure_usd": 1717.36,
"recoverable_pct": 0.684
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106944",
"label": "benign",
"label_confidence": 0.607,
"severity": "low",
"timestamp": "2026-01-05T19:44:00Z",
"trace_id": "752b5e83-65e8-4ebf-5360-e52f989c53d0"
} | {
"account_age_days": 1995,
"account_id": "ACCT-479CD786E3E1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.351
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 841,
"timestamp": "2026-01-05T19:44:00Z",
"transaction_amount_usd": 2316.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2078.87,
"financial_exposure_usd": 3136.33,
"recoverable_pct": 0.81
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107896",
"label": "benign",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-06T11:36:00Z",
"trace_id": "e0b1a14d-e950-f601-0fe3-a3da5c5ae8cf"
} | {
"account_age_days": 286,
"account_id": "ACCT-334298B0383B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.941
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 422,
"timestamp": "2026-01-06T11:36:00Z",
"transaction_amount_usd": 4146.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4617.52,
"financial_exposure_usd": 5543.09,
"recoverable_pct": 0.508
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107850",
"label": "benign",
"label_confidence": 0.624,
"severity": "low",
"timestamp": "2026-01-06T10:50:00Z",
"trace_id": "8490e002-329f-3b1c-2df4-0e760f247737"
} | {
"account_age_days": 1221,
"account_id": "ACCT-F324D3E9DDD1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.127
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 955,
"timestamp": "2026-01-06T10:50:00Z",
"transaction_amount_usd": 12914.77
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.476,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 661.69,
"financial_exposure_usd": 1189.92,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100101",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-01T01:41:00Z",
"trace_id": "11776f21-d48f-5ba3-0d87-bc72bce05a63"
} | {
"account_age_days": 585,
"account_id": "ACCT-AD2E4DB89DEF",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.4
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 700,
"timestamp": "2026-01-01T01:41:00Z",
"transaction_amount_usd": 116662.67
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.367,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 332689.34,
"financial_exposure_usd": 697580.63,
"recoverable_pct": 0.311
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100557",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "medium",
"timestamp": "2026-01-01T09:17:00Z",
"trace_id": "7142aa48-6eab-e256-2b56-43acc106f517"
} | {
"account_age_days": 933,
"account_id": "ACCT-29D5EE57E71B",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_3",
"session_entropy": 0.476
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1069,
"timestamp": "2026-01-01T09:17:00Z",
"transaction_amount_usd": 20890.53
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.939,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 450087.99,
"financial_exposure_usd": 469865.37,
"recoverable_pct": 0.117
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106714",
"label": "benign",
"label_confidence": 0.569,
"severity": "critical",
"timestamp": "2026-01-05T15:54:00Z",
"trace_id": "686c3958-f431-fedd-7003-e7d9e724677e"
} | {
"account_age_days": 413,
"account_id": "ACCT-A4057D09A32C",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_2",
"session_entropy": 0.16
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1185,
"timestamp": "2026-01-05T15:54:00Z",
"transaction_amount_usd": 11821.81
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1181.07,
"financial_exposure_usd": 2186.53,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103401",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-03T08:41:00Z",
"trace_id": "603eaba6-4368-baa6-a4e0-229bc5130254"
} | {
"account_age_days": 501,
"account_id": "ACCT-C22105AB0D2C",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_1",
"session_entropy": 0.562
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 260,
"timestamp": "2026-01-02T23:39:00Z",
"transaction_amount_usd": 19.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.893,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3549791.75,
"financial_exposure_usd": 4817114.98,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108652",
"label": "benign",
"label_confidence": 0.514,
"severity": "low",
"timestamp": "2026-01-07T00:12:00Z",
"trace_id": "e156aaa0-9080-b642-91b2-545f37b1e347"
} | {
"account_age_days": 780,
"account_id": "ACCT-8C06F32FD407",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.842
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 363,
"timestamp": "2026-01-06T13:39:00Z",
"transaction_amount_usd": 18.32
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 163.61,
"financial_exposure_usd": 258.35,
"recoverable_pct": 0.64
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109196",
"label": "benign",
"label_confidence": 0.584,
"severity": "high",
"timestamp": "2026-01-07T09:16:00Z",
"trace_id": "cec2d82e-3321-f9b5-cd3c-83172477f07c"
} | {
"account_age_days": 1640,
"account_id": "ACCT-F7EDECF31AAD",
"baseline_risk_score": 0.092,
"kyc_tier": "tier_2",
"session_entropy": 0.934
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 819,
"timestamp": "2026-01-07T09:16:00Z",
"transaction_amount_usd": 3452.29
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.624,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1770.81,
"financial_exposure_usd": 1902.1,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100615",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-01T10:15:00Z",
"trace_id": "7887343f-2806-d3e5-7048-34f20363f8ee"
} | {
"account_age_days": 1566,
"account_id": "ACCT-A56B3436706B",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_1",
"session_entropy": 0.526
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 396,
"timestamp": "2026-01-01T08:05:00Z",
"transaction_amount_usd": 17.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.465,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 549218.3,
"financial_exposure_usd": 1158528.54,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106736",
"label": "benign",
"label_confidence": 0.567,
"severity": "low",
"timestamp": "2026-01-05T16:16:00Z",
"trace_id": "27155a19-6460-9f89-1336-e2ad0c4278a6"
} | {
"account_age_days": 1812,
"account_id": "ACCT-D998BBAEEB0D",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 263,
"timestamp": "2026-01-05T16:16:00Z",
"transaction_amount_usd": 3507.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.581,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1760.38,
"financial_exposure_usd": 4046.15,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109340",
"label": "benign",
"label_confidence": 0.47,
"severity": "low",
"timestamp": "2026-01-07T11:40:00Z",
"trace_id": "057d32cd-5d13-ded0-96df-27efb2b053f2"
} | {
"account_age_days": 1092,
"account_id": "ACCT-54275A86B693",
"baseline_risk_score": 0.158,
"kyc_tier": "tier_3",
"session_entropy": 0.476
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 120,
"timestamp": "2026-01-07T10:35:00Z",
"transaction_amount_usd": 21.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.709,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 295.41,
"financial_exposure_usd": 654.02,
"recoverable_pct": 0.563
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108716",
"label": "benign",
"label_confidence": 0.638,
"severity": "low",
"timestamp": "2026-01-07T01:16:00Z",
"trace_id": "543cf759-f26f-a936-c8dd-c636a2973bc8"
} | {
"account_age_days": 1743,
"account_id": "ACCT-94518FCD6AF0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1040,
"timestamp": "2026-01-07T01:16:00Z",
"transaction_amount_usd": 2212.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.466,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 797.22,
"financial_exposure_usd": 1114.86,
"recoverable_pct": 0.973
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106694",
"label": "benign",
"label_confidence": 0.45,
"severity": "low",
"timestamp": "2026-01-05T15:34:00Z",
"trace_id": "fe69785b-f8d4-fc7a-f44a-846fed6f7c40"
} | {
"account_age_days": 413,
"account_id": "ACCT-3AABC7A2A6D2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 671,
"timestamp": "2026-01-05T15:34:00Z",
"transaction_amount_usd": 5810.39
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.787,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4882.68,
"financial_exposure_usd": 8575.69,
"recoverable_pct": 0.916
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106415",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "critical",
"timestamp": "2026-01-05T10:55:00Z",
"trace_id": "b7d670f2-5f7d-da96-9f48-f4963c77a352"
} | {
"account_age_days": 226,
"account_id": "ACCT-69CB6B6A9981",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_1",
"session_entropy": 0.438
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 90,
"timestamp": "2026-01-05T04:53:00Z",
"transaction_amount_usd": 1.42
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.82,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4570289.33,
"financial_exposure_usd": 5755917.51,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105451",
"label": "fraudulent",
"label_confidence": 0.697,
"severity": "low",
"timestamp": "2026-01-04T18:51:00Z",
"trace_id": "1a9a5c1b-dd30-601c-afb5-1ca3cb318b59"
} | {
"account_age_days": 1675,
"account_id": "ACCT-7B84D5B7C880",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_3",
"session_entropy": 0.134
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1066,
"timestamp": "2026-01-04T18:51:00Z",
"transaction_amount_usd": 264832.93
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.878,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2305291.86,
"financial_exposure_usd": 2869220.24,
"recoverable_pct": 0.885
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108230",
"label": "benign",
"label_confidence": 0.55,
"severity": "medium",
"timestamp": "2026-01-06T17:10:00Z",
"trace_id": "3df2952f-b679-70b3-629f-e7e06d25ad02"
} | {
"account_age_days": 723,
"account_id": "ACCT-AFCE2A346A22",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.591
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 215,
"timestamp": "2026-01-06T17:10:00Z",
"transaction_amount_usd": 621.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.691,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3337.84,
"financial_exposure_usd": 5124.23,
"recoverable_pct": 0.669
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100227",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-01T03:47:00Z",
"trace_id": "c979a0e1-7b8f-e7cf-ba2c-43ec43f84fcf"
} | {
"account_age_days": 138,
"account_id": "ACCT-F2D058CA7B2E",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_2",
"session_entropy": 0.889
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 255,
"timestamp": "2026-01-01T02:13:00Z",
"transaction_amount_usd": 2
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.611,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 241441.62,
"financial_exposure_usd": 490308.91,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101280",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-01T21:20:00Z",
"trace_id": "e2d5bb74-f248-d910-63ef-e056cff801df"
} | {
"account_age_days": 1620,
"account_id": "ACCT-D10D643CE26D",
"baseline_risk_score": 0.621,
"kyc_tier": "tier_2",
"session_entropy": 0.463
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 488,
"timestamp": "2026-01-01T21:20:00Z",
"transaction_amount_usd": 75717.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.794,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 154491.9,
"financial_exposure_usd": 278788.33,
"recoverable_pct": 0.387
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105061",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "medium",
"timestamp": "2026-01-04T12:21:00Z",
"trace_id": "184c51bf-f5f6-6452-dd26-fdaeabe3190e"
} | {
"account_age_days": 1846,
"account_id": "ACCT-1EFE327DECE5",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_1",
"session_entropy": 0.599
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 571,
"timestamp": "2026-01-04T12:21:00Z",
"transaction_amount_usd": 1336474.34
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.638,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3676813.05,
"financial_exposure_usd": 8453385.61,
"recoverable_pct": 0.554
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105553",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "high",
"timestamp": "2026-01-04T20:33:00Z",
"trace_id": "0526d239-33ac-9e05-a7a8-f39dfb81b1b6"
} | {
"account_age_days": 442,
"account_id": "ACCT-2217D94E82E8",
"baseline_risk_score": 0.367,
"kyc_tier": "tier_2",
"session_entropy": 0.755
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 835,
"timestamp": "2026-01-04T20:33:00Z",
"transaction_amount_usd": 546163.94
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.84,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3724717.61,
"financial_exposure_usd": 4873749.28,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106328",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-05T09:28:00Z",
"trace_id": "5c2ae412-6254-f435-1fdd-105805601891"
} | {
"account_age_days": 1080,
"account_id": "ACCT-27632E48222F",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_3",
"session_entropy": 0.467
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 397,
"timestamp": "2026-01-05T07:31:00Z",
"transaction_amount_usd": 19.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.841,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 771889.68,
"financial_exposure_usd": 1866358,
"recoverable_pct": 0.468
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108826",
"label": "benign",
"label_confidence": 0.652,
"severity": "high",
"timestamp": "2026-01-07T03:06:00Z",
"trace_id": "6ba9c2e9-18d2-c4ec-2f6e-18729609bbc3"
} | {
"account_age_days": 1803,
"account_id": "ACCT-5536A82D1645",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.422
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 125,
"timestamp": "2026-01-07T03:06:00Z",
"transaction_amount_usd": 14623.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1235.97,
"financial_exposure_usd": 1769.59,
"recoverable_pct": 0.97
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104524",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "medium",
"timestamp": "2026-01-04T03:24:00Z",
"trace_id": "9668eb82-3e67-ddc1-1cc0-56acaf712faa"
} | {
"account_age_days": 1639,
"account_id": "ACCT-E6CE3C4F80B7",
"baseline_risk_score": 0.282,
"kyc_tier": "tier_3",
"session_entropy": 0.603
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 1191,
"timestamp": "2026-01-04T03:24:00Z",
"transaction_amount_usd": 1687807.95
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.522,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3932928.91,
"financial_exposure_usd": 5327734.35,
"recoverable_pct": 0.933
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107831",
"label": "benign",
"label_confidence": 0.638,
"severity": "low",
"timestamp": "2026-01-06T10:31:00Z",
"trace_id": "05e290de-484b-aa7f-c40f-74781e9ceb9f"
} | {
"account_age_days": 1074,
"account_id": "ACCT-CA19C879C724",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_3",
"session_entropy": 0.925
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 706,
"timestamp": "2026-01-06T10:31:00Z",
"transaction_amount_usd": 6953.53
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.571,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 20.4,
"financial_exposure_usd": 43.26,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103970",
"label": "fraudulent",
"label_confidence": 0.644,
"severity": "high",
"timestamp": "2026-01-03T18:10:00Z",
"trace_id": "f66c18df-2bb7-85cf-dfde-2f2caa7e8dce"
} | {
"account_age_days": 1066,
"account_id": "ACCT-F7719F394AB6",
"baseline_risk_score": 0.146,
"kyc_tier": "tier_1",
"session_entropy": 0.938
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 621,
"timestamp": "2026-01-03T18:10:00Z",
"transaction_amount_usd": 899472.12
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.477,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2691379.01,
"financial_exposure_usd": 5349107.84,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102406",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "critical",
"timestamp": "2026-01-02T16:06:00Z",
"trace_id": "5af954ff-edd4-9d1b-0a6d-8950bd5b9854"
} | {
"account_age_days": 838,
"account_id": "ACCT-86CF8E84C439",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_2",
"session_entropy": 0.865
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 232,
"timestamp": "2026-01-02T06:04:00Z",
"transaction_amount_usd": 6.63
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.665,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 441712.99,
"financial_exposure_usd": 994810.61,
"recoverable_pct": 0.359
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104100",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-03T20:20:00Z",
"trace_id": "6371741b-7a7a-714d-67b0-a6eeede51707"
} | {
"account_age_days": 682,
"account_id": "ACCT-423DED6B461E",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_1",
"session_entropy": 0.44
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 361,
"timestamp": "2026-01-03T14:57:00Z",
"transaction_amount_usd": 10.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.8,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 4687777.11,
"financial_exposure_usd": 5250858.37,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100574",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "high",
"timestamp": "2026-01-01T09:34:00Z",
"trace_id": "53f835cb-12e6-fb9d-b689-ec1ae82ce1fc"
} | {
"account_age_days": 1430,
"account_id": "ACCT-F232EEFF2442",
"baseline_risk_score": 0.538,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 205,
"timestamp": "2026-01-01T06:49:00Z",
"transaction_amount_usd": 6.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.926,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 585162.77,
"financial_exposure_usd": 928573.42,
"recoverable_pct": 0.013
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100720",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "high",
"timestamp": "2026-01-01T12:00:00Z",
"trace_id": "8173e1c0-513d-5c96-dfab-137c6d5cd5d4"
} | {
"account_age_days": 1268,
"account_id": "ACCT-CC43AE7A99D6",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_1",
"session_entropy": 0.942
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 943,
"timestamp": "2026-01-01T12:00:00Z",
"transaction_amount_usd": 81481.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.773,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 226719.74,
"financial_exposure_usd": 319399.38,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106218",
"label": "fraudulent",
"label_confidence": 0.645,
"severity": "low",
"timestamp": "2026-01-05T07:38:00Z",
"trace_id": "bb53393b-f9d1-a170-f133-d0289ac78b2b"
} | {
"account_age_days": 586,
"account_id": "ACCT-D741D4113C12",
"baseline_risk_score": 0.41,
"kyc_tier": "tier_2",
"session_entropy": 0.877
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 233,
"timestamp": "2026-01-04T21:33:00Z",
"transaction_amount_usd": 8.52
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4469245.59,
"financial_exposure_usd": 7309674.75,
"recoverable_pct": 0.691
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107038",
"label": "benign",
"label_confidence": 0.585,
"severity": "high",
"timestamp": "2026-01-05T21:18:00Z",
"trace_id": "8bd4d5fb-c028-9cd7-4a30-b285f73afdca"
} | {
"account_age_days": 187,
"account_id": "ACCT-6F365545971A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.384
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 300,
"timestamp": "2026-01-05T11:08:00Z",
"transaction_amount_usd": 3.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.681,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 439.08,
"financial_exposure_usd": 764.12,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100280",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "critical",
"timestamp": "2026-01-01T04:40:00Z",
"trace_id": "89887d52-7599-d475-1b13-9a48492eb70c"
} | {
"account_age_days": 292,
"account_id": "ACCT-022B2E42CC1E",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_2",
"session_entropy": 0.852
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 192,
"timestamp": "2025-12-31T23:50:00Z",
"transaction_amount_usd": 23.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.562,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 497873.17,
"financial_exposure_usd": 1114701.47,
"recoverable_pct": 0.393
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100258",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "low",
"timestamp": "2026-01-01T04:18:00Z",
"trace_id": "baad0da4-65aa-6c06-5d43-3dc2cb115be6"
} | {
"account_age_days": 1689,
"account_id": "ACCT-315EB39F82E9",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_1",
"session_entropy": 0.148
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1081,
"timestamp": "2026-01-01T04:18:00Z",
"transaction_amount_usd": 21205.33
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.696,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 476159.79,
"financial_exposure_usd": 1059100.9,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104306",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "medium",
"timestamp": "2026-01-03T23:46:00Z",
"trace_id": "9fbabf73-68a0-f6ab-3b84-fc5862b0f53f"
} | {
"account_age_days": 1275,
"account_id": "ACCT-07F3FFF16763",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_2",
"session_entropy": 0.698
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 162,
"timestamp": "2026-01-03T17:11:00Z",
"transaction_amount_usd": 13.87
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.45,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4815000.96,
"financial_exposure_usd": 5132964.5,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105664",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "high",
"timestamp": "2026-01-04T22:24:00Z",
"trace_id": "cdb77c4c-a992-4099-d08c-bdf5bb7bb429"
} | {
"account_age_days": 639,
"account_id": "ACCT-04F50374248D",
"baseline_risk_score": 0.345,
"kyc_tier": "tier_2",
"session_entropy": 0.59
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1172,
"timestamp": "2026-01-04T22:24:00Z",
"transaction_amount_usd": 875046.32
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.936,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1398256.7,
"financial_exposure_usd": 1456431.23,
"recoverable_pct": 0.827
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107210",
"label": "benign",
"label_confidence": 0.583,
"severity": "high",
"timestamp": "2026-01-06T00:10:00Z",
"trace_id": "50e41143-d160-aa45-dbca-268fb61dc93b"
} | {
"account_age_days": 577,
"account_id": "ACCT-B439AFD22D4D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.599
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 767,
"timestamp": "2026-01-06T00:10:00Z",
"transaction_amount_usd": 8083.31
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.694,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 217.62,
"financial_exposure_usd": 503.75,
"recoverable_pct": 0.661
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100261",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-01T04:21:00Z",
"trace_id": "ea0970c6-907e-5f2d-7f13-387af4e30570"
} | {
"account_age_days": 839,
"account_id": "ACCT-320B5AB7159D",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_2",
"session_entropy": 0.532
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 986,
"timestamp": "2026-01-01T04:21:00Z",
"transaction_amount_usd": 51071.1
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1075587.49,
"financial_exposure_usd": 1299689.35,
"recoverable_pct": 0.282
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104072",
"label": "fraudulent",
"label_confidence": 0.673,
"severity": "high",
"timestamp": "2026-01-03T19:52:00Z",
"trace_id": "489deb3c-fd53-b95a-a52e-34815e77f7cb"
} | {
"account_age_days": 775,
"account_id": "ACCT-2FA7C41AF544",
"baseline_risk_score": 0.207,
"kyc_tier": "tier_2",
"session_entropy": 0.401
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 166,
"timestamp": "2026-01-03T19:52:00Z",
"transaction_amount_usd": 362756.38
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.778,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7662029.57,
"financial_exposure_usd": 7722973.57,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101407",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-01T23:27:00Z",
"trace_id": "c660633a-25ce-7677-dd7b-aabe1eb3e57d"
} | {
"account_age_days": 541,
"account_id": "ACCT-DE76608D32B9",
"baseline_risk_score": 0.361,
"kyc_tier": "tier_2",
"session_entropy": 0.657
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 262,
"timestamp": "2026-01-01T13:45:00Z",
"transaction_amount_usd": 3.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.658,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 242581.35,
"financial_exposure_usd": 446774.47,
"recoverable_pct": 0.021
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103239",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "high",
"timestamp": "2026-01-03T05:59:00Z",
"trace_id": "6bb69cbc-087d-c567-a9b9-5240591eeb13"
} | {
"account_age_days": 1920,
"account_id": "ACCT-7FA1F595947F",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.45
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 216,
"timestamp": "2026-01-03T05:59:00Z",
"transaction_amount_usd": 77207.86
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.566,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 235282.4,
"financial_exposure_usd": 405431.79,
"recoverable_pct": 0.376
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109805",
"label": "benign",
"label_confidence": 0.549,
"severity": "low",
"timestamp": "2026-01-07T19:25:00Z",
"trace_id": "55f7a042-24df-cff8-f5f9-b528aa3eb65a"
} | {
"account_age_days": 1856,
"account_id": "ACCT-82B152C20366",
"baseline_risk_score": 0.08,
"kyc_tier": "tier_2",
"session_entropy": 0.756
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 152,
"timestamp": "2026-01-07T19:25:00Z",
"transaction_amount_usd": 13104.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.477,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3941.67,
"financial_exposure_usd": 6335.88,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107757",
"label": "benign",
"label_confidence": 0.664,
"severity": "medium",
"timestamp": "2026-01-06T09:17:00Z",
"trace_id": "3bf9ca62-e923-a3f7-d3ba-2ae57940f9da"
} | {
"account_age_days": 818,
"account_id": "ACCT-AAFE2D58F345",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.88
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 667,
"timestamp": "2026-01-06T09:17:00Z",
"transaction_amount_usd": 10762.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.723,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 705.47,
"financial_exposure_usd": 1725.7,
"recoverable_pct": 0.804
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108426",
"label": "benign",
"label_confidence": 0.482,
"severity": "high",
"timestamp": "2026-01-06T20:26:00Z",
"trace_id": "6a8c5086-d808-7812-4516-238ecd3eb9f1"
} | {
"account_age_days": 1000,
"account_id": "ACCT-4A18F62DEDD0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.71
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 620,
"timestamp": "2026-01-06T20:26:00Z",
"transaction_amount_usd": 3506.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1202.19,
"financial_exposure_usd": 1299.96,
"recoverable_pct": 0.41
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109017",
"label": "benign",
"label_confidence": 0.548,
"severity": "medium",
"timestamp": "2026-01-07T06:17:00Z",
"trace_id": "3bf3ab88-8f01-02ae-1f1f-dab16568dbab"
} | {
"account_age_days": 742,
"account_id": "ACCT-E1D08E57A174",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.203
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 202,
"timestamp": "2026-01-07T00:29:00Z",
"transaction_amount_usd": 18.6
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1099.29,
"financial_exposure_usd": 2248.96,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107956",
"label": "benign",
"label_confidence": 0.584,
"severity": "medium",
"timestamp": "2026-01-06T12:36:00Z",
"trace_id": "7db361be-5ce9-66f8-d8bf-55f9fae9bb74"
} | {
"account_age_days": 1130,
"account_id": "ACCT-7F07E7BADE81",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.722
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 989,
"timestamp": "2026-01-06T12:36:00Z",
"transaction_amount_usd": 4053.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.494,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4476.42,
"financial_exposure_usd": 5121.28,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109779",
"label": "benign",
"label_confidence": 0.646,
"severity": "medium",
"timestamp": "2026-01-07T18:59:00Z",
"trace_id": "64900914-5eba-4418-22b2-6bd00fb851d5"
} | {
"account_age_days": 1695,
"account_id": "ACCT-F33DC3AE9EB8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.725
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 857,
"timestamp": "2026-01-07T18:59:00Z",
"transaction_amount_usd": 7542.61
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.525,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2002.25,
"financial_exposure_usd": 2344.14,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102378",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "critical",
"timestamp": "2026-01-02T15:38:00Z",
"trace_id": "30ed55da-04a4-6985-f31c-66ce9ff4a2ab"
} | {
"account_age_days": 1926,
"account_id": "ACCT-633D8995422A",
"baseline_risk_score": 0.545,
"kyc_tier": "tier_1",
"session_entropy": 0.642
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 163,
"timestamp": "2026-01-02T15:38:00Z",
"transaction_amount_usd": 115972.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.447,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 342637,
"financial_exposure_usd": 496124.67,
"recoverable_pct": 0.279
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101449",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "high",
"timestamp": "2026-01-02T00:09:00Z",
"trace_id": "8ebc421d-3a3b-2c42-356e-f7d8cfc147e7"
} | {
"account_age_days": 169,
"account_id": "ACCT-84068FD025B1",
"baseline_risk_score": 0.576,
"kyc_tier": "tier_2",
"session_entropy": 0.157
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 1148,
"timestamp": "2026-01-02T00:09:00Z",
"transaction_amount_usd": 85119.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 600215.84,
"financial_exposure_usd": 1015898.73,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104683",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "high",
"timestamp": "2026-01-04T06:03:00Z",
"trace_id": "953c413d-a501-4494-c1e6-6564cf28f88c"
} | {
"account_age_days": 961,
"account_id": "ACCT-81BB449E925D",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_1",
"session_entropy": 0.856
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 313,
"timestamp": "2026-01-03T19:44:00Z",
"transaction_amount_usd": 24.23
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.916,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4450171.63,
"financial_exposure_usd": 6662606.11,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101354",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "critical",
"timestamp": "2026-01-01T22:34:00Z",
"trace_id": "8b4e251a-7614-d621-12dd-add7d5d62690"
} | {
"account_age_days": 237,
"account_id": "ACCT-B2D37AB6BDA2",
"baseline_risk_score": 0.557,
"kyc_tier": "tier_3",
"session_entropy": 0.286
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 751,
"timestamp": "2026-01-01T22:34:00Z",
"transaction_amount_usd": 59081.48
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 624731.08,
"financial_exposure_usd": 739052.33,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105382",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "medium",
"timestamp": "2026-01-04T17:42:00Z",
"trace_id": "9c8671f6-134f-edc1-afb7-af0eb1b1752f"
} | {
"account_age_days": 1536,
"account_id": "ACCT-1472B0A9F13E",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_1",
"session_entropy": 0.708
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 757,
"timestamp": "2026-01-04T17:42:00Z",
"transaction_amount_usd": 1098992.95
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.848,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4453527.74,
"financial_exposure_usd": 5392777.4,
"recoverable_pct": 0.416
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109188",
"label": "benign",
"label_confidence": 0.564,
"severity": "critical",
"timestamp": "2026-01-07T09:08:00Z",
"trace_id": "631d4138-646d-0701-ed2d-b715acfa7d00"
} | {
"account_age_days": 185,
"account_id": "ACCT-CF78E4BBD987",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.85
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 668,
"timestamp": "2026-01-07T09:08:00Z",
"transaction_amount_usd": 12371.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.545,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2417.01,
"financial_exposure_usd": 2601.55,
"recoverable_pct": 0.921
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108305",
"label": "benign",
"label_confidence": 0.547,
"severity": "high",
"timestamp": "2026-01-06T18:25:00Z",
"trace_id": "2782c697-25ae-14d0-ebb6-c9dd342472d2"
} | {
"account_age_days": 1293,
"account_id": "ACCT-D19F52C48A04",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.728
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 916,
"timestamp": "2026-01-06T18:25:00Z",
"transaction_amount_usd": 7455.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.52,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 988.12,
"financial_exposure_usd": 1987.02,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106010",
"label": "fraudulent",
"label_confidence": 0.61,
"severity": "critical",
"timestamp": "2026-01-05T04:10:00Z",
"trace_id": "8f6dcb08-294c-baa4-000e-754ba927f0e0"
} | {
"account_age_days": 899,
"account_id": "ACCT-E236930B020C",
"baseline_risk_score": 0.307,
"kyc_tier": "tier_2",
"session_entropy": 0.398
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 348,
"timestamp": "2026-01-05T04:10:00Z",
"transaction_amount_usd": 2997721.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.615,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4488583.34,
"financial_exposure_usd": 4932877.82,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100617",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "low",
"timestamp": "2026-01-01T10:17:00Z",
"trace_id": "1ad1e843-563e-787c-f58e-20c9ec731eed"
} | {
"account_age_days": 1956,
"account_id": "ACCT-0290220B9E7E",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_1",
"session_entropy": 0.612
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 283,
"timestamp": "2026-01-01T10:17:00Z",
"transaction_amount_usd": 119179.03
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.898,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 901081.75,
"financial_exposure_usd": 993133.93,
"recoverable_pct": 0.628
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101347",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-01T22:27:00Z",
"trace_id": "49107ff5-556a-5bea-5df8-f271c4e15ffe"
} | {
"account_age_days": 1316,
"account_id": "ACCT-4789BC507734",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.103
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 90,
"timestamp": "2026-01-01T19:47:00Z",
"transaction_amount_usd": 7.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.944,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 513478.51,
"financial_exposure_usd": 817872.81,
"recoverable_pct": 0.108
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101628",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "high",
"timestamp": "2026-01-02T03:08:00Z",
"trace_id": "9a7cf983-06bb-07b5-315c-d7334333d4bc"
} | {
"account_age_days": 123,
"account_id": "ACCT-A07123524970",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_2",
"session_entropy": 0.672
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 931,
"timestamp": "2026-01-02T03:08:00Z",
"transaction_amount_usd": 59873.07
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.796,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 392734.15,
"financial_exposure_usd": 688922.57,
"recoverable_pct": 0.352
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107102",
"label": "benign",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-05T22:22:00Z",
"trace_id": "9d8b6ef6-6e7e-cbdf-e566-c89c16f5cd0c"
} | {
"account_age_days": 654,
"account_id": "ACCT-D8472D742658",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.342
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1056,
"timestamp": "2026-01-05T22:22:00Z",
"transaction_amount_usd": 9595.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.605,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1974.01,
"financial_exposure_usd": 2189.3,
"recoverable_pct": 0.598
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101750",
"label": "fraudulent",
"label_confidence": 0.772,
"severity": "critical",
"timestamp": "2026-01-02T05:10:00Z",
"trace_id": "e07ca34e-48ec-e0ce-3762-65e0da00681a"
} | {
"account_age_days": 858,
"account_id": "ACCT-E5C0A57E58F4",
"baseline_risk_score": 0.562,
"kyc_tier": "tier_2",
"session_entropy": 0.214
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 742,
"timestamp": "2026-01-02T05:10:00Z",
"transaction_amount_usd": 82432.4
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.677,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 705056.94,
"financial_exposure_usd": 1066277.63,
"recoverable_pct": 0.255
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103160",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-03T04:40:00Z",
"trace_id": "85b30d9d-1dc5-84b5-dddb-a0bbeea38bc8"
} | {
"account_age_days": 181,
"account_id": "ACCT-6136A84C2382",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_3",
"session_entropy": 0.364
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 149,
"timestamp": "2026-01-02T22:06:00Z",
"transaction_amount_usd": 9.76
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.4,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 774652.99,
"financial_exposure_usd": 903848.26,
"recoverable_pct": 0.52
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105411",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "low",
"timestamp": "2026-01-04T18:11:00Z",
"trace_id": "a74a05dd-1b93-d349-c0e2-78a1a6fafb2b"
} | {
"account_age_days": 699,
"account_id": "ACCT-5D9EE47A3CD7",
"baseline_risk_score": 0.43,
"kyc_tier": "tier_3",
"session_entropy": 0.365
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 296,
"timestamp": "2026-01-04T07:19:00Z",
"transaction_amount_usd": 1.82
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.811,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4335481.92,
"financial_exposure_usd": 5095006.96,
"recoverable_pct": 0.631
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108447",
"label": "benign",
"label_confidence": 0.609,
"severity": "low",
"timestamp": "2026-01-06T20:47:00Z",
"trace_id": "fee738e7-7a91-d4f9-d9d9-37aa80532fb6"
} | {
"account_age_days": 1357,
"account_id": "ACCT-BF7A7BB106D2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.383
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 237,
"timestamp": "2026-01-06T18:54:00Z",
"transaction_amount_usd": 1.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.559,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5867.18,
"financial_exposure_usd": 6123.47,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101625",
"label": "fraudulent",
"label_confidence": 0.761,
"severity": "high",
"timestamp": "2026-01-02T03:05:00Z",
"trace_id": "ecbe0c07-c4fd-bbfc-2e04-ab33458ce99f"
} | {
"account_age_days": 1211,
"account_id": "ACCT-714A3EC69C68",
"baseline_risk_score": 0.482,
"kyc_tier": "tier_2",
"session_entropy": 0.406
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 399,
"timestamp": "2026-01-02T03:05:00Z",
"transaction_amount_usd": 10123.2
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.429,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 312433.64,
"financial_exposure_usd": 335797.95,
"recoverable_pct": 0.341
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104420",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "critical",
"timestamp": "2026-01-04T01:40:00Z",
"trace_id": "b472d2bc-83f3-94d1-9627-16c925c9ea78"
} | {
"account_age_days": 149,
"account_id": "ACCT-A8420A9F19BA",
"baseline_risk_score": 0.243,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 319,
"timestamp": "2026-01-04T01:40:00Z",
"transaction_amount_usd": 924025.4
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.655,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4065586.01,
"financial_exposure_usd": 4092446.43,
"recoverable_pct": 0.814
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107886",
"label": "benign",
"label_confidence": 0.645,
"severity": "high",
"timestamp": "2026-01-06T11:26:00Z",
"trace_id": "e7611f38-d0ad-b904-e17d-2ece7222381c"
} | {
"account_age_days": 946,
"account_id": "ACCT-EC086C918F45",
"baseline_risk_score": 0.177,
"kyc_tier": "tier_3",
"session_entropy": 0.569
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 208,
"timestamp": "2026-01-06T02:36:00Z",
"transaction_amount_usd": 9.08
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.49,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 374.18,
"financial_exposure_usd": 429.28,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108919",
"label": "benign",
"label_confidence": 0.687,
"severity": "medium",
"timestamp": "2026-01-07T04:39:00Z",
"trace_id": "9df73a3e-90b8-5e0c-74fc-30562b6bce7b"
} | {
"account_age_days": 81,
"account_id": "ACCT-B78F38BE084C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.227
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 804,
"timestamp": "2026-01-07T04:39:00Z",
"transaction_amount_usd": 9946.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.757,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2763.8,
"financial_exposure_usd": 4130.69,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101226",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-01T20:26:00Z",
"trace_id": "326107f3-b616-2d55-5c44-6cbf78b5000a"
} | {
"account_age_days": 1936,
"account_id": "ACCT-05AA2EBB7158",
"baseline_risk_score": 0.581,
"kyc_tier": "tier_3",
"session_entropy": 0.157
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 299,
"timestamp": "2026-01-01T20:26:00Z",
"transaction_amount_usd": 98118.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 753132.04,
"financial_exposure_usd": 1403301.81,
"recoverable_pct": 0.617
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105722",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-04T23:22:00Z",
"trace_id": "7a86bf51-17a5-6871-2bfc-ccf9138dc8a1"
} | {
"account_age_days": 1404,
"account_id": "ACCT-3604B76765E6",
"baseline_risk_score": 0.236,
"kyc_tier": "tier_2",
"session_entropy": 0.116
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 265,
"timestamp": "2026-01-04T14:55:00Z",
"transaction_amount_usd": 20.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POST... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.505,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1979393.85,
"financial_exposure_usd": 2299696.97,
"recoverable_pct": 0.446
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103146",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "critical",
"timestamp": "2026-01-03T04:26:00Z",
"trace_id": "580db9cf-4f2f-59f4-a3e2-34ae42d48824"
} | {
"account_age_days": 1755,
"account_id": "ACCT-622E5489CDC6",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_3",
"session_entropy": 0.648
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 203,
"timestamp": "2026-01-03T01:12:00Z",
"transaction_amount_usd": 9.1
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.902,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 988099.76,
"financial_exposure_usd": 1131780.56,
"recoverable_pct": 0.124
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103990",
"label": "fraudulent",
"label_confidence": 0.725,
"severity": "low",
"timestamp": "2026-01-03T18:30:00Z",
"trace_id": "10c1d39e-45c1-440d-52dc-7cf3d72240b5"
} | {
"account_age_days": 1549,
"account_id": "ACCT-DF00A8E113E3",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_1",
"session_entropy": 0.329
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 187,
"timestamp": "2026-01-03T18:30:00Z",
"transaction_amount_usd": 1303692.61
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.882,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1652843.13,
"financial_exposure_usd": 3635557.22,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104157",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "medium",
"timestamp": "2026-01-03T21:17:00Z",
"trace_id": "99835dca-b382-77dd-0f70-f9b2908f69b6"
} | {
"account_age_days": 1547,
"account_id": "ACCT-9851F12AF37F",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_3",
"session_entropy": 0.546
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 790,
"timestamp": "2026-01-03T21:17:00Z",
"transaction_amount_usd": 104013.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.571,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4214422.18,
"financial_exposure_usd": 4534183.34,
"recoverable_pct": 0.529
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105246",
"label": "fraudulent",
"label_confidence": 0.606,
"severity": "medium",
"timestamp": "2026-01-04T15:26:00Z",
"trace_id": "c95e4979-7d25-b911-ef50-4fcc15ee3bc3"
} | {
"account_age_days": 424,
"account_id": "ACCT-DB0F89652FDA",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_2",
"session_entropy": 0.414
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 245,
"timestamp": "2026-01-04T08:33:00Z",
"transaction_amount_usd": 15.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.797,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2764685.76,
"financial_exposure_usd": 3054702.06,
"recoverable_pct": 0.577
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106152",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "high",
"timestamp": "2026-01-05T06:32:00Z",
"trace_id": "df21c719-3176-8a67-3bb2-c6979e85e678"
} | {
"account_age_days": 1277,
"account_id": "ACCT-748B9438FB88",
"baseline_risk_score": 0.28,
"kyc_tier": "tier_1",
"session_entropy": 0.528
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 122,
"timestamp": "2026-01-04T20:03:00Z",
"transaction_amount_usd": 11.39
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.448,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1391463.63,
"financial_exposure_usd": 2005917.18,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107568",
"label": "benign",
"label_confidence": 0.588,
"severity": "critical",
"timestamp": "2026-01-06T06:08:00Z",
"trace_id": "1f277f6f-720d-fc4f-6a09-4d650bda50c1"
} | {
"account_age_days": 53,
"account_id": "ACCT-EFCD850D3F51",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.764
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 207,
"timestamp": "2026-01-06T02:57:00Z",
"transaction_amount_usd": 24.87
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1929.6,
"financial_exposure_usd": 2364.61,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107861",
"label": "benign",
"label_confidence": 0.652,
"severity": "low",
"timestamp": "2026-01-06T11:01:00Z",
"trace_id": "d201d51e-9570-b3b3-8f77-76738a81de3d"
} | {
"account_age_days": 1013,
"account_id": "ACCT-46E31DF24255",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.166
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 873,
"timestamp": "2026-01-06T11:01:00Z",
"transaction_amount_usd": 7696.26
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1027.1,
"financial_exposure_usd": 1511.88,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100064",
"label": "fraudulent",
"label_confidence": 0.889,
"severity": "high",
"timestamp": "2026-01-01T01:04:00Z",
"trace_id": "a9a54c24-02b6-22e9-808e-08d25d264b1b"
} | {
"account_age_days": 160,
"account_id": "ACCT-709D338B2393",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_3",
"session_entropy": 0.241
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 367,
"timestamp": "2026-01-01T01:04:00Z",
"transaction_amount_usd": 96881.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.477,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 361782.41,
"financial_exposure_usd": 731739.2,
"recoverable_pct": 0.512
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102844",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "medium",
"timestamp": "2026-01-02T23:24:00Z",
"trace_id": "61abe617-1979-dc31-63bc-93056d53121f"
} | {
"account_age_days": 1068,
"account_id": "ACCT-5C9F516F50C4",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_3",
"session_entropy": 0.242
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 128,
"timestamp": "2026-01-02T12:48:00Z",
"transaction_amount_usd": 14.95
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.672,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 524227.96,
"financial_exposure_usd": 1022913.98,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101578",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "critical",
"timestamp": "2026-01-02T02:18:00Z",
"trace_id": "03e0ca06-1603-3d9f-aa03-21de30e334de"
} | {
"account_age_days": 1096,
"account_id": "ACCT-1BAA337BAB35",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_3",
"session_entropy": 0.692
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 87,
"timestamp": "2026-01-01T22:16:00Z",
"transaction_amount_usd": 15.63
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.827,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 824075.7,
"financial_exposure_usd": 1097273.1,
"recoverable_pct": 0.067
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103024",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "high",
"timestamp": "2026-01-03T02:24:00Z",
"trace_id": "596b0f1b-0816-9d39-a09e-b7c6d2e2a2d8"
} | {
"account_age_days": 927,
"account_id": "ACCT-12AB8B5DBABF",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_2",
"session_entropy": 0.496
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 198,
"timestamp": "2026-01-03T02:24:00Z",
"transaction_amount_usd": 95273.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 466173.98,
"financial_exposure_usd": 669505.51,
"recoverable_pct": 0.255
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103366",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-03T08:06:00Z",
"trace_id": "bc9358d4-9d49-1004-4c28-82bfb8debc8d"
} | {
"account_age_days": 749,
"account_id": "ACCT-DC007D7E8352",
"baseline_risk_score": 0.217,
"kyc_tier": "tier_2",
"session_entropy": 0.462
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1179,
"timestamp": "2026-01-03T08:06:00Z",
"transaction_amount_usd": 2621776.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.777,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7074663.6,
"financial_exposure_usd": 7250477.06,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105645",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-04T22:05:00Z",
"trace_id": "f5de81fe-6eda-ec15-ee90-ddc15972b155"
} | {
"account_age_days": 1825,
"account_id": "ACCT-C7994EB60A12",
"baseline_risk_score": 0.178,
"kyc_tier": "tier_3",
"session_entropy": 0.51
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 472,
"timestamp": "2026-01-04T22:05:00Z",
"transaction_amount_usd": 1246123.44
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.807,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3146224.87,
"financial_exposure_usd": 4982220.6,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102809",
"label": "fraudulent",
"label_confidence": 0.854,
"severity": "critical",
"timestamp": "2026-01-02T22:49:00Z",
"trace_id": "68363f5c-0d2a-bd76-b528-bf5ee21a8503"
} | {
"account_age_days": 1822,
"account_id": "ACCT-4E47CAB87493",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_2",
"session_entropy": 0.565
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1053,
"timestamp": "2026-01-02T22:49:00Z",
"transaction_amount_usd": 107246.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.432,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 265611.74,
"financial_exposure_usd": 514636.1,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109437",
"label": "benign",
"label_confidence": 0.743,
"severity": "medium",
"timestamp": "2026-01-07T13:17:00Z",
"trace_id": "42af1eec-ba81-ea58-cd2c-17ba29499884"
} | {
"account_age_days": 1730,
"account_id": "ACCT-DE9DFB79A9F8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.934
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 282,
"timestamp": "2026-01-07T13:17:00Z",
"transaction_amount_usd": 6269.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.612,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 348.13,
"financial_exposure_usd": 418.38,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109230",
"label": "benign",
"label_confidence": 0.54,
"severity": "high",
"timestamp": "2026-01-07T09:50:00Z",
"trace_id": "0c8efdaf-989d-7a52-bb72-3b9d61ef8571"
} | {
"account_age_days": 605,
"account_id": "ACCT-2AFCDC878F98",
"baseline_risk_score": 0.097,
"kyc_tier": "tier_2",
"session_entropy": 0.827
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 829,
"timestamp": "2026-01-07T09:50:00Z",
"transaction_amount_usd": 6578.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.622,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1765.26,
"financial_exposure_usd": 2510.13,
"recoverable_pct": 0.775
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105718",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "high",
"timestamp": "2026-01-04T23:18:00Z",
"trace_id": "ba9d6d98-3080-17c8-7a36-856557aad4e3"
} | {
"account_age_days": 762,
"account_id": "ACCT-B5F4BFFCB7CC",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.31
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 111,
"timestamp": "2026-01-04T16:40:00Z",
"transaction_amount_usd": 16.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.503,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3196181.19,
"financial_exposure_usd": 4336575.54,
"recoverable_pct": 0.449
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106220",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "high",
"timestamp": "2026-01-05T07:40:00Z",
"trace_id": "0359f115-ae60-9888-7704-3458ad231e04"
} | {
"account_age_days": 1368,
"account_id": "ACCT-9B260214E64A",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_3",
"session_entropy": 0.524
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 493,
"timestamp": "2026-01-05T07:40:00Z",
"transaction_amount_usd": 2535331.41
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.442,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5594450.83,
"financial_exposure_usd": 5722854.61,
"recoverable_pct": 0.749
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109756",
"label": "benign",
"label_confidence": 0.455,
"severity": "low",
"timestamp": "2026-01-07T18:36:00Z",
"trace_id": "344aa465-9653-e7ba-3486-8ca363f4bb00"
} | {
"account_age_days": 1443,
"account_id": "ACCT-D9596B9AA65F",
"baseline_risk_score": 0.088,
"kyc_tier": "tier_1",
"session_entropy": 0.171
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 624,
"timestamp": "2026-01-07T18:36:00Z",
"transaction_amount_usd": 9672.64
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.54,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 783.25,
"financial_exposure_usd": 1827.36,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102596",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-02T19:16:00Z",
"trace_id": "f6a1968f-2c77-ca21-2358-6bd6c3fe74f4"
} | {
"account_age_days": 1389,
"account_id": "ACCT-C5F98F7D7F22",
"baseline_risk_score": 0.618,
"kyc_tier": "tier_2",
"session_entropy": 0.182
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 159,
"timestamp": "2026-01-02T19:16:00Z",
"transaction_amount_usd": 82725.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.423,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 534579.88,
"financial_exposure_usd": 550517.91,
"recoverable_pct": 0.179
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101931",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-02T08:11:00Z",
"trace_id": "53f6d5be-2267-da8e-e928-875df45d601d"
} | {
"account_age_days": 1046,
"account_id": "ACCT-653EF4697043",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_2",
"session_entropy": 0.143
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 369,
"timestamp": "2026-01-02T08:11:00Z",
"transaction_amount_usd": 100970.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 905504.36,
"financial_exposure_usd": 1002092.21,
"recoverable_pct": 0.303
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106645",
"label": "fraudulent",
"label_confidence": 0.732,
"severity": "high",
"timestamp": "2026-01-05T14:45:00Z",
"trace_id": "37d17c93-382b-3ca8-4cd5-5121908f97a2"
} | {
"account_age_days": 360,
"account_id": "ACCT-F8F269C9C864",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.457
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 355,
"timestamp": "2026-01-05T05:06:00Z",
"transaction_amount_usd": 22.57
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4207892.76,
"financial_exposure_usd": 4300073.28,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107665",
"label": "benign",
"label_confidence": 0.546,
"severity": "high",
"timestamp": "2026-01-06T07:45:00Z",
"trace_id": "9406536a-df1f-e37d-0811-63fa4757df3f"
} | {
"account_age_days": 30,
"account_id": "ACCT-DEF3231F3385",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.171
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 338,
"timestamp": "2026-01-05T19:43:00Z",
"transaction_amount_usd": 0.53
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.662,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 8672.56,
"financial_exposure_usd": 9405.25,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106472",
"label": "fraudulent",
"label_confidence": 0.939,
"severity": "high",
"timestamp": "2026-01-05T11:52:00Z",
"trace_id": "3a80aa42-3643-d936-b2e1-054977430cd2"
} | {
"account_age_days": 987,
"account_id": "ACCT-F9BBAE48AD4E",
"baseline_risk_score": 0.198,
"kyc_tier": "tier_1",
"session_entropy": 0.297
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 781,
"timestamp": "2026-01-05T11:52:00Z",
"transaction_amount_usd": 1995768.71
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.377,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4366584.75,
"financial_exposure_usd": 6264793.23,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109960",
"label": "benign",
"label_confidence": 0.72,
"severity": "medium",
"timestamp": "2026-01-07T22:00:00Z",
"trace_id": "f102d804-353e-7fdb-6093-e052fd761db4"
} | {
"account_age_days": 736,
"account_id": "ACCT-9EFFABCCE411",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.898
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 182,
"timestamp": "2026-01-07T15:53:00Z",
"transaction_amount_usd": 16.99
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.764,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 293.02,
"financial_exposure_usd": 482.91,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103264",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-03T06:24:00Z",
"trace_id": "409b847c-9461-9d59-00c4-941e1c3935dc"
} | {
"account_age_days": 1374,
"account_id": "ACCT-FF8CAE68380E",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.515
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 1155,
"timestamp": "2026-01-03T06:24:00Z",
"transaction_amount_usd": 26574.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.464,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 501485.97,
"financial_exposure_usd": 687180.39,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108884",
"label": "benign",
"label_confidence": 0.59,
"severity": "critical",
"timestamp": "2026-01-07T04:04:00Z",
"trace_id": "42a6dbd7-cdf8-3e3d-ab55-bff6bddaffda"
} | {
"account_age_days": 1309,
"account_id": "ACCT-71B2D819E337",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.13
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 302,
"timestamp": "2026-01-07T04:04:00Z",
"transaction_amount_usd": 7366.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1168.1,
"financial_exposure_usd": 1172.04,
"recoverable_pct": 0.85
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104768",
"label": "fraudulent",
"label_confidence": 0.676,
"severity": "high",
"timestamp": "2026-01-04T07:28:00Z",
"trace_id": "49143b1d-a089-6944-2ef8-420a1edb5382"
} | {
"account_age_days": 1310,
"account_id": "ACCT-0CB3F2B0D688",
"baseline_risk_score": 0.405,
"kyc_tier": "tier_1",
"session_entropy": 0.181
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 90,
"timestamp": "2026-01-04T07:28:00Z",
"transaction_amount_usd": 2720004.96
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.462,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3188959.17,
"financial_exposure_usd": 6649690.25,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107878",
"label": "benign",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-06T11:18:00Z",
"trace_id": "e8037baa-0682-dc0b-7255-8143933ed3f4"
} | {
"account_age_days": 508,
"account_id": "ACCT-41918E606207",
"baseline_risk_score": 0.138,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 281,
"timestamp": "2026-01-06T08:30:00Z",
"transaction_amount_usd": 2.36
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2044.97,
"financial_exposure_usd": 3434.7,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.