schema_version
stringclasses
1 value
event
dict
identity_context
dict
telemetry_stream
listlengths
6
9
vulnerability
dict
detection
dict
impact
dict
simulation
dict
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108553", "label": "benign", "label_confidence": 0.604, "severity": "low", "timestamp": "2026-01-06T22:33:00Z", "trace_id": "e703ce88-968b-8fa8-a909-0f564bb65f3c" }
{ "account_age_days": 329, "account_id": "ACCT-D0AC1EDA6B7C", "baseline_risk_score": 0.186, "kyc_tier": "tier_1", "session_entropy": 0.335 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 319, "timestamp": "2026-01-06T16:45:00Z", "transaction_amount_usd": 22.67 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.773, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 1099.83, "financial_exposure_usd": 1256.33, "recoverable_pct": 0.974 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104800", "label": "fraudulent", "label_confidence": 0.775, "severity": "high", "timestamp": "2026-01-04T08:00:00Z", "trace_id": "6ce083d9-0507-0eac-c507-3942e0b44f5a" }
{ "account_age_days": 1879, "account_id": "ACCT-247BD2F58005", "baseline_risk_score": 0.392, "kyc_tier": "tier_1", "session_entropy": 0.717 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 1187, "timestamp": "2026-01-04T08:00:00Z", "transaction_amount_usd": 1503780.67 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.866, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2460757.96, "financial_exposure_usd": 3162792.08, "recoverable_pct": 0.503 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107005", "label": "benign", "label_confidence": 0.722, "severity": "low", "timestamp": "2026-01-05T20:45:00Z", "trace_id": "4c40f2aa-7594-63a9-02f8-bd9792d8585a" }
{ "account_age_days": 1474, "account_id": "ACCT-22247E9AD3DC", "baseline_risk_score": 0.134, "kyc_tier": "tier_1", "session_entropy": 0.36 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 155, "timestamp": "2026-01-05T08:24:00Z", "transaction_amount_usd": 18.73 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.706, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1294.47, "financial_exposure_usd": 3175.18, "recoverable_pct": 0.447 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102282", "label": "fraudulent", "label_confidence": 0.814, "severity": "medium", "timestamp": "2026-01-02T14:02:00Z", "trace_id": "71989e12-2a9b-84b4-e1a3-fa8ee577d32d" }
{ "account_age_days": 1498, "account_id": "ACCT-1D84A3DF5BE0", "baseline_risk_score": 0.339, "kyc_tier": "tier_2", "session_entropy": 0.411 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 289, "timestamp": "2026-01-02T14:02:00Z", "transaction_amount_usd": 116594.13 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.501, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 574321.17, "financial_exposure_usd": 798757.41, "recoverable_pct": 0.351 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104051", "label": "fraudulent", "label_confidence": 0.77, "severity": "medium", "timestamp": "2026-01-03T19:31:00Z", "trace_id": "72f5b196-116e-6d93-fa4a-9dcc3230d332" }
{ "account_age_days": 63, "account_id": "ACCT-95D7D402E46B", "baseline_risk_score": 0.114, "kyc_tier": "tier_3", "session_entropy": 0.443 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 752, "timestamp": "2026-01-03T19:31:00Z", "transaction_amount_usd": 1161156.4 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.849, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 6007950.3, "financial_exposure_usd": 7719415.45, "recoverable_pct": 0.676 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105197", "label": "fraudulent", "label_confidence": 0.821, "severity": "high", "timestamp": "2026-01-04T14:37:00Z", "trace_id": "70d9babd-1df9-9495-7d19-24499478ba41" }
{ "account_age_days": 695, "account_id": "ACCT-E1284A474CF9", "baseline_risk_score": 0.363, "kyc_tier": "tier_2", "session_entropy": 0.403 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 236, "timestamp": "2026-01-04T08:49:00Z", "transaction_amount_usd": 6.97 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.683, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 5953930.11, "financial_exposure_usd": 6258753.16, "recoverable_pct": 0.405 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105297", "label": "fraudulent", "label_confidence": 0.852, "severity": "medium", "timestamp": "2026-01-04T16:17:00Z", "trace_id": "998ca8fa-f6e2-59b5-84bd-3bde6ad9eff7" }
{ "account_age_days": 95, "account_id": "ACCT-2D48E29C82F1", "baseline_risk_score": 0.31, "kyc_tier": "tier_2", "session_entropy": 0.571 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 298, "timestamp": "2026-01-04T13:24:00Z", "transaction_amount_usd": 20.61 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.442, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4403529.19, "financial_exposure_usd": 8006670.09, "recoverable_pct": 0.866 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101071", "label": "fraudulent", "label_confidence": 0.979, "severity": "critical", "timestamp": "2026-01-01T17:51:00Z", "trace_id": "481ac3cf-c43c-0415-57cb-34d418726b56" }
{ "account_age_days": 287, "account_id": "ACCT-0ED2075907C4", "baseline_risk_score": 0.521, "kyc_tier": "tier_1", "session_entropy": 0.64 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 809, "timestamp": "2026-01-01T17:51:00Z", "transaction_amount_usd": 25557.51 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.858, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 198989.12, "financial_exposure_usd": 475711.28, "recoverable_pct": 0.711 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103731", "label": "fraudulent", "label_confidence": 0.851, "severity": "low", "timestamp": "2026-01-03T14:11:00Z", "trace_id": "79ba5d27-e034-de8c-c905-e0de9e2265ee" }
{ "account_age_days": 287, "account_id": "ACCT-4E911A69552E", "baseline_risk_score": 0.344, "kyc_tier": "tier_2", "session_entropy": 0.196 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CA", "latency_ms": 122, "timestamp": "2026-01-03T08:16:00Z", "transaction_amount_usd": 18.73 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.554, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3827995.89, "financial_exposure_usd": 4232521.18, "recoverable_pct": 0.828 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104307", "label": "fraudulent", "label_confidence": 0.716, "severity": "medium", "timestamp": "2026-01-03T23:47:00Z", "trace_id": "f517ebf0-227b-9ab2-9af8-b7ef0480862d" }
{ "account_age_days": 608, "account_id": "ACCT-790AFC65764E", "baseline_risk_score": 0.256, "kyc_tier": "tier_3", "session_entropy": 0.22 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 1196, "timestamp": "2026-01-03T23:47:00Z", "transaction_amount_usd": 628028.7 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.668, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3084875.12, "financial_exposure_usd": 7218653.26, "recoverable_pct": 0.506 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102996", "label": "fraudulent", "label_confidence": 0.757, "severity": "critical", "timestamp": "2026-01-03T01:56:00Z", "trace_id": "02a889f8-3aa9-0870-ccde-7a3de6821dfd" }
{ "account_age_days": 396, "account_id": "ACCT-54A9E5317CFA", "baseline_risk_score": 0.407, "kyc_tier": "tier_1", "session_entropy": 0.592 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CA", "latency_ms": 987, "timestamp": "2026-01-03T01:56:00Z", "transaction_amount_usd": 54478.52 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.496, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 676454.86, "financial_exposure_usd": 750381.71, "recoverable_pct": 0.292 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106013", "label": "fraudulent", "label_confidence": 0.627, "severity": "low", "timestamp": "2026-01-05T04:13:00Z", "trace_id": "8bb2a04c-c1df-7587-cb61-d38794ce92e0" }
{ "account_age_days": 500, "account_id": "ACCT-4DAEABA86F36", "baseline_risk_score": 0.321, "kyc_tier": "tier_2", "session_entropy": 0.668 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 450, "timestamp": "2026-01-05T04:13:00Z", "transaction_amount_usd": 738186.69 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.664, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 4568166.37, "financial_exposure_usd": 4815321.49, "recoverable_pct": 0.464 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105741", "label": "fraudulent", "label_confidence": 0.744, "severity": "critical", "timestamp": "2026-01-04T23:41:00Z", "trace_id": "93027c5a-cd77-4c1a-19af-3ea82046c7cb" }
{ "account_age_days": 173, "account_id": "ACCT-3F07EE8B6BAF", "baseline_risk_score": 0.113, "kyc_tier": "tier_1", "session_entropy": 0.475 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 909, "timestamp": "2026-01-04T23:41:00Z", "transaction_amount_usd": 1368699.26 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.62, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 2395238.26, "financial_exposure_usd": 4820815.34, "recoverable_pct": 0.545 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107031", "label": "benign", "label_confidence": 0.493, "severity": "high", "timestamp": "2026-01-05T21:11:00Z", "trace_id": "f9fa857a-ad58-3ca1-e9f4-d9565cf4b7d5" }
{ "account_age_days": 480, "account_id": "ACCT-0F4F4EA331B7", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.545 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 439, "timestamp": "2026-01-05T21:11:00Z", "transaction_amount_usd": 6629.18 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.607, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2097.24, "financial_exposure_usd": 2111.08, "recoverable_pct": 0.847 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101062", "label": "fraudulent", "label_confidence": 0.955, "severity": "high", "timestamp": "2026-01-01T17:42:00Z", "trace_id": "db2ee589-b8e6-9a48-e830-ddb7f5cb676b" }
{ "account_age_days": 1958, "account_id": "ACCT-D34DF7500301", "baseline_risk_score": 0.353, "kyc_tier": "tier_2", "session_entropy": 0.582 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NL", "latency_ms": 176, "timestamp": "2026-01-01T17:42:00Z", "transaction_amount_usd": 54902.63 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.506, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 575022.36, "financial_exposure_usd": 855553.76, "recoverable_pct": 0.367 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103720", "label": "fraudulent", "label_confidence": 0.768, "severity": "critical", "timestamp": "2026-01-03T14:00:00Z", "trace_id": "42617625-8cd5-5563-623d-07bad72ee859" }
{ "account_age_days": 391, "account_id": "ACCT-E61AC62D63B1", "baseline_risk_score": 0.175, "kyc_tier": "tier_2", "session_entropy": 0.77 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 406, "timestamp": "2026-01-03T14:00:00Z", "transaction_amount_usd": 759803.61 }, { "asset": "EUR", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.429, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 2102160.94, "financial_exposure_usd": 2679307.14, "recoverable_pct": 0.505 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104761", "label": "fraudulent", "label_confidence": 0.702, "severity": "critical", "timestamp": "2026-01-04T07:21:00Z", "trace_id": "f0a668fb-b54c-f18d-fac4-c12f8fc81952" }
{ "account_age_days": 1329, "account_id": "ACCT-446CA1544B51", "baseline_risk_score": 0.332, "kyc_tier": "tier_1", "session_entropy": 0.889 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 893, "timestamp": "2026-01-04T07:21:00Z", "transaction_amount_usd": 1392603.66 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.604, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3008465.85, "financial_exposure_usd": 4837595.78, "recoverable_pct": 0.65 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109698", "label": "benign", "label_confidence": 0.508, "severity": "low", "timestamp": "2026-01-07T17:38:00Z", "trace_id": "f80bebbf-6a65-cb21-bc6f-b51adffe62db" }
{ "account_age_days": 286, "account_id": "ACCT-E6E9DEF45BE8", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.299 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 850, "timestamp": "2026-01-07T17:38:00Z", "transaction_amount_usd": 5652.3 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.685, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3834.92, "financial_exposure_usd": 8621.15, "recoverable_pct": 0.666 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108467", "label": "benign", "label_confidence": 0.586, "severity": "low", "timestamp": "2026-01-06T21:07:00Z", "trace_id": "743e1a59-1a59-0bbc-a203-e4ee0a918e44" }
{ "account_age_days": 374, "account_id": "ACCT-A510DC246DD1", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.822 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "BR", "latency_ms": 186, "timestamp": "2026-01-06T20:32:00Z", "transaction_amount_usd": 13.82 }, { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.714, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1376.7, "financial_exposure_usd": 1920.53, "recoverable_pct": 0.965 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105777", "label": "fraudulent", "label_confidence": 0.832, "severity": "medium", "timestamp": "2026-01-05T00:17:00Z", "trace_id": "e191237f-a0aa-f8c9-2d32-6eef6bd16bbd" }
{ "account_age_days": 106, "account_id": "ACCT-5835995F0BB0", "baseline_risk_score": 0.239, "kyc_tier": "tier_1", "session_entropy": 0.448 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 1039, "timestamp": "2026-01-05T00:17:00Z", "transaction_amount_usd": 337150.95 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.5, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post...
{ "customer_funds_at_risk_usd": 3137339.62, "financial_exposure_usd": 3236632.87, "recoverable_pct": 0.714 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105934", "label": "fraudulent", "label_confidence": 0.781, "severity": "high", "timestamp": "2026-01-05T02:54:00Z", "trace_id": "2d833225-2315-4ddb-f5a5-a648651f92b3" }
{ "account_age_days": 1263, "account_id": "ACCT-A9C7A72C5E76", "baseline_risk_score": 0.173, "kyc_tier": "tier_1", "session_entropy": 0.215 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 892, "timestamp": "2026-01-05T02:54:00Z", "transaction_amount_usd": 1755503.06 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.576, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4168013.43, "financial_exposure_usd": 5167141.89, "recoverable_pct": 0.851 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102640", "label": "fraudulent", "label_confidence": 0.836, "severity": "critical", "timestamp": "2026-01-02T20:00:00Z", "trace_id": "621c1ba0-18fe-73e0-1710-14a408822cef" }
{ "account_age_days": 1853, "account_id": "ACCT-DDDA28034FFC", "baseline_risk_score": 0.324, "kyc_tier": "tier_2", "session_entropy": 0.884 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "GB", "latency_ms": 354, "timestamp": "2026-01-02T20:00:00Z", "transaction_amount_usd": 16333.45 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.533, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 443626.47, "financial_exposure_usd": 495202.26, "recoverable_pct": 0.434 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103449", "label": "fraudulent", "label_confidence": 0.625, "severity": "high", "timestamp": "2026-01-03T09:29:00Z", "trace_id": "2b1397f6-2ebe-941c-8997-5114ca18e8d6" }
{ "account_age_days": 1436, "account_id": "ACCT-FDB07B1F9927", "baseline_risk_score": 0.323, "kyc_tier": "tier_1", "session_entropy": 0.901 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 904, "timestamp": "2026-01-03T09:29:00Z", "transaction_amount_usd": 1935201.98 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.365, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 3424214.11, "financial_exposure_usd": 5310928.08, "recoverable_pct": 0.852 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104549", "label": "fraudulent", "label_confidence": 0.627, "severity": "high", "timestamp": "2026-01-04T03:49:00Z", "trace_id": "947f3c0b-eea6-35e3-ecb6-31fa3ce28d85" }
{ "account_age_days": 1958, "account_id": "ACCT-5FB798347156", "baseline_risk_score": 0.166, "kyc_tier": "tier_3", "session_entropy": 0.378 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "FR", "latency_ms": 461, "timestamp": "2026-01-04T03:49:00Z", "transaction_amount_usd": 1183149.41 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.354, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 4833650.53, "financial_exposure_usd": 6100927.77, "recoverable_pct": 0.849 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109187", "label": "benign", "label_confidence": 0.479, "severity": "critical", "timestamp": "2026-01-07T09:07:00Z", "trace_id": "141a6552-446b-5ec8-4b5f-39564458797e" }
{ "account_age_days": 218, "account_id": "ACCT-1BDE58CD7F03", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.103 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 587, "timestamp": "2026-01-07T09:07:00Z", "transaction_amount_usd": 6991.16 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.675, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 2785.01, "financial_exposure_usd": 3809.28, "recoverable_pct": 0.514 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106966", "label": "benign", "label_confidence": 0.689, "severity": "low", "timestamp": "2026-01-05T20:06:00Z", "trace_id": "26ddbc58-5a70-48d4-9783-478202273c32" }
{ "account_age_days": 1748, "account_id": "ACCT-365BAB2C3B2E", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.101 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 379, "timestamp": "2026-01-05T15:45:00Z", "transaction_amount_usd": 14.06 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.573, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 2403.34, "financial_exposure_usd": 2640.13, "recoverable_pct": 0.488 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102023", "label": "fraudulent", "label_confidence": 0.797, "severity": "critical", "timestamp": "2026-01-02T09:43:00Z", "trace_id": "06b97bb0-94ed-3d3b-d229-ac0657630683" }
{ "account_age_days": 1516, "account_id": "ACCT-BDCD96BD74DA", "baseline_risk_score": 0.264, "kyc_tier": "tier_3", "session_entropy": 0.73 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 972, "timestamp": "2026-01-02T09:43:00Z", "transaction_amount_usd": 69242.73 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.642, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 510325.2, "financial_exposure_usd": 834842.2, "recoverable_pct": 0.353 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101813", "label": "fraudulent", "label_confidence": 0.871, "severity": "low", "timestamp": "2026-01-02T06:13:00Z", "trace_id": "a3217d04-fc62-8f68-c1b6-4926888393b6" }
{ "account_age_days": 57, "account_id": "ACCT-73BCB71BD5B9", "baseline_risk_score": 0.648, "kyc_tier": "tier_2", "session_entropy": 0.192 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 203, "timestamp": "2026-01-02T06:13:00Z", "transaction_amount_usd": 12609.76 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.698, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 737541.73, "financial_exposure_usd": 763551.1, "recoverable_pct": 0.04 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103934", "label": "fraudulent", "label_confidence": 0.741, "severity": "critical", "timestamp": "2026-01-03T17:34:00Z", "trace_id": "5a059af7-4b15-d798-fb9d-361a59058dd1" }
{ "account_age_days": 1921, "account_id": "ACCT-B78A0E544D04", "baseline_risk_score": 0.335, "kyc_tier": "tier_1", "session_entropy": 0.662 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 194, "timestamp": "2026-01-03T05:44:00Z", "transaction_amount_usd": 21.63 }, { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.596, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2899872.28, "financial_exposure_usd": 3436410.9, "recoverable_pct": 0.788 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105807", "label": "fraudulent", "label_confidence": 0.759, "severity": "medium", "timestamp": "2026-01-05T00:47:00Z", "trace_id": "9986e7ad-a189-a232-bbed-a0bd44727625" }
{ "account_age_days": 1897, "account_id": "ACCT-535D37279D0D", "baseline_risk_score": 0.203, "kyc_tier": "tier_1", "session_entropy": 0.458 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "JP", "latency_ms": 228, "timestamp": "2026-01-05T00:47:00Z", "transaction_amount_usd": 1341971.38 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.41, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p...
{ "customer_funds_at_risk_usd": 3021331.93, "financial_exposure_usd": 3437046.85, "recoverable_pct": 0.852 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104879", "label": "fraudulent", "label_confidence": 0.919, "severity": "low", "timestamp": "2026-01-04T09:19:00Z", "trace_id": "2dfa22c8-b66d-11b6-f68f-ad1ad97060a1" }
{ "account_age_days": 1419, "account_id": "ACCT-C9A86D747B38", "baseline_risk_score": 0.14, "kyc_tier": "tier_2", "session_entropy": 0.545 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "PK", "latency_ms": 672, "timestamp": "2026-01-04T09:19:00Z", "transaction_amount_usd": 1185377.34 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.57, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN...
{ "customer_funds_at_risk_usd": 3074036.44, "financial_exposure_usd": 3789991.73, "recoverable_pct": 0.522 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102855", "label": "fraudulent", "label_confidence": 0.847, "severity": "critical", "timestamp": "2026-01-02T23:35:00Z", "trace_id": "9107370a-b8a2-3dab-dd3d-a58c1955b842" }
{ "account_age_days": 1585, "account_id": "ACCT-76EA6A64BC70", "baseline_risk_score": 0.588, "kyc_tier": "tier_1", "session_entropy": 0.854 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "MY", "latency_ms": 902, "timestamp": "2026-01-02T23:35:00Z", "transaction_amount_usd": 117931.04 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.725, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 513729.51, "financial_exposure_usd": 678637.59, "recoverable_pct": 0.381 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106830", "label": "benign", "label_confidence": 0.497, "severity": "medium", "timestamp": "2026-01-05T17:50:00Z", "trace_id": "46fa7dc2-1ae5-279e-0ed4-b0cd39c39832" }
{ "account_age_days": 777, "account_id": "ACCT-5C9694CFBBC1", "baseline_risk_score": 0.061, "kyc_tier": "tier_1", "session_entropy": 0.143 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "VN", "latency_ms": 577, "timestamp": "2026-01-05T17:50:00Z", "transaction_amount_usd": 367.25 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.499, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1379.4, "financial_exposure_usd": 1717.81, "recoverable_pct": 0.585 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107356", "label": "benign", "label_confidence": 0.457, "severity": "low", "timestamp": "2026-01-06T02:36:00Z", "trace_id": "f55ff2ad-06ab-2041-7e76-d3fc551c24f2" }
{ "account_age_days": 590, "account_id": "ACCT-F83AB7DF88EB", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.393 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ES", "latency_ms": 951, "timestamp": "2026-01-06T02:36:00Z", "transaction_amount_usd": 2107.89 }, { "asset": "USDT", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.67, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 217.88, "financial_exposure_usd": 256.83, "recoverable_pct": 0.587 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103986", "label": "fraudulent", "label_confidence": 0.675, "severity": "critical", "timestamp": "2026-01-03T18:26:00Z", "trace_id": "61c4cfba-c566-fe9b-dfee-89e88362132e" }
{ "account_age_days": 1691, "account_id": "ACCT-3974F5BAF4C8", "baseline_risk_score": 0.289, "kyc_tier": "tier_3", "session_entropy": 0.48 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 231, "timestamp": "2026-01-03T13:48:00Z", "transaction_amount_usd": 21.42 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.528, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2831489.61, "financial_exposure_usd": 6127849.68, "recoverable_pct": 0.502 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108375", "label": "benign", "label_confidence": 0.649, "severity": "low", "timestamp": "2026-01-06T19:35:00Z", "trace_id": "41f59e50-2873-832b-fee0-7383121bc460" }
{ "account_age_days": 1785, "account_id": "ACCT-AD87103832C7", "baseline_risk_score": 0.136, "kyc_tier": "tier_3", "session_entropy": 0.419 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 132, "timestamp": "2026-01-06T17:10:00Z", "transaction_amount_usd": 19.53 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.641, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 2926.63, "financial_exposure_usd": 5158.03, "recoverable_pct": 0.646 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102746", "label": "fraudulent", "label_confidence": 0.89, "severity": "critical", "timestamp": "2026-01-02T21:46:00Z", "trace_id": "79dbaa4f-f076-9450-9fc4-90b6e143abc9" }
{ "account_age_days": 1035, "account_id": "ACCT-78BDFD57E7ED", "baseline_risk_score": 0.564, "kyc_tier": "tier_3", "session_entropy": 0.806 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 167, "timestamp": "2026-01-02T21:46:00Z", "transaction_amount_usd": 27410.06 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.392, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 231332.47, "financial_exposure_usd": 287327.08, "recoverable_pct": 0.12 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108843", "label": "benign", "label_confidence": 0.694, "severity": "low", "timestamp": "2026-01-07T03:23:00Z", "trace_id": "d298ebd4-0574-53b2-d3e5-b8a762472274" }
{ "account_age_days": 1702, "account_id": "ACCT-DC6D7F017909", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.119 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "FR", "latency_ms": 711, "timestamp": "2026-01-07T03:23:00Z", "transaction_amount_usd": 3952.69 }, { "asset": "SOL", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.763, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 913.45, "financial_exposure_usd": 1952.94, "recoverable_pct": 0.514 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102542", "label": "fraudulent", "label_confidence": 0.964, "severity": "high", "timestamp": "2026-01-02T18:22:00Z", "trace_id": "ffa3d8c8-1afb-9b82-d4eb-ebcefc0581b7" }
{ "account_age_days": 1737, "account_id": "ACCT-87C9191558CD", "baseline_risk_score": 0.397, "kyc_tier": "tier_3", "session_entropy": 0.344 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "FR", "latency_ms": 90, "timestamp": "2026-01-02T18:22:00Z", "transaction_amount_usd": 59410.47 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.503, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 429101.3, "financial_exposure_usd": 743617.04, "recoverable_pct": 0.476 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106138", "label": "fraudulent", "label_confidence": 0.859, "severity": "medium", "timestamp": "2026-01-05T06:18:00Z", "trace_id": "0bf151b7-1b9b-0899-dfbe-43239dbfa555" }
{ "account_age_days": 282, "account_id": "ACCT-D872B246996B", "baseline_risk_score": 0.165, "kyc_tier": "tier_1", "session_entropy": 0.671 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "MY", "latency_ms": 488, "timestamp": "2026-01-05T06:18:00Z", "transaction_amount_usd": 1464401.57 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.363, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 8465813.34, "financial_exposure_usd": 8997045.38, "recoverable_pct": 0.599 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109742", "label": "benign", "label_confidence": 0.579, "severity": "low", "timestamp": "2026-01-07T18:22:00Z", "trace_id": "bc9db071-22e3-cc64-72e8-f53cd1f9e4f1" }
{ "account_age_days": 517, "account_id": "ACCT-5C987959870C", "baseline_risk_score": 0.116, "kyc_tier": "tier_2", "session_entropy": 0.425 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "SG", "latency_ms": 400, "timestamp": "2026-01-07T17:14:00Z", "transaction_amount_usd": 10.11 }, { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.536, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1324.73, "financial_exposure_usd": 2223.03, "recoverable_pct": 0.914 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101619", "label": "fraudulent", "label_confidence": 0.807, "severity": "medium", "timestamp": "2026-01-02T02:59:00Z", "trace_id": "4e5fa7a1-aa48-b1cf-c3a9-b5e403276b4d" }
{ "account_age_days": 1069, "account_id": "ACCT-F5DE699F78DE", "baseline_risk_score": 0.622, "kyc_tier": "tier_3", "session_entropy": 0.873 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 357, "timestamp": "2026-01-01T22:48:00Z", "transaction_amount_usd": 20.68 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.546, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 431825.23, "financial_exposure_usd": 953995.34, "recoverable_pct": 0.806 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102222", "label": "fraudulent", "label_confidence": 0.887, "severity": "medium", "timestamp": "2026-01-02T13:02:00Z", "trace_id": "200b2b3d-7132-f5aa-def4-cd93a3436548" }
{ "account_age_days": 1901, "account_id": "ACCT-8B00224C451F", "baseline_risk_score": 0.489, "kyc_tier": "tier_2", "session_entropy": 0.611 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "BR", "latency_ms": 1074, "timestamp": "2026-01-02T13:02:00Z", "transaction_amount_usd": 65345.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.835, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 921559.86, "financial_exposure_usd": 1157168.2, "recoverable_pct": 0.058 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104942", "label": "fraudulent", "label_confidence": 0.847, "severity": "critical", "timestamp": "2026-01-04T10:22:00Z", "trace_id": "7e60ffd5-db87-cf29-2d2a-afe1db75eb7b" }
{ "account_age_days": 569, "account_id": "ACCT-774A8782A96D", "baseline_risk_score": 0.326, "kyc_tier": "tier_3", "session_entropy": 0.215 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "US", "latency_ms": 122, "timestamp": "2026-01-04T10:22:00Z", "transaction_amount_usd": 724075.82 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.896, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1835398.42, "financial_exposure_usd": 2339875.8, "recoverable_pct": 0.615 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102808", "label": "fraudulent", "label_confidence": 0.845, "severity": "medium", "timestamp": "2026-01-02T22:48:00Z", "trace_id": "5085ed14-62bc-e1b0-d7e4-d1dd5f9698d1" }
{ "account_age_days": 1710, "account_id": "ACCT-8AEC429E4F5F", "baseline_risk_score": 0.407, "kyc_tier": "tier_2", "session_entropy": 0.258 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "GB", "latency_ms": 703, "timestamp": "2026-01-02T22:48:00Z", "transaction_amount_usd": 112402.74 }, { "asset": "SOL", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.808, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 251011.79, "financial_exposure_usd": 571840.78, "recoverable_pct": 0.121 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108558", "label": "benign", "label_confidence": 0.628, "severity": "high", "timestamp": "2026-01-06T22:38:00Z", "trace_id": "82e9e527-d19d-b9bc-6156-dcf574174c28" }
{ "account_age_days": 967, "account_id": "ACCT-F11B6B061F81", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.172 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "JP", "latency_ms": 804, "timestamp": "2026-01-06T22:38:00Z", "transaction_amount_usd": 9671.62 }, { "asset": "GBP", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.473, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 939.3, "financial_exposure_usd": 1735.44, "recoverable_pct": 0.786 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104543", "label": "fraudulent", "label_confidence": 0.6, "severity": "medium", "timestamp": "2026-01-04T03:43:00Z", "trace_id": "9ccc7f79-6dd5-9c1d-82d4-e8228a248431" }
{ "account_age_days": 1637, "account_id": "ACCT-3A1DABAC0AB1", "baseline_risk_score": 0.095, "kyc_tier": "tier_3", "session_entropy": 0.492 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CA", "latency_ms": 613, "timestamp": "2026-01-04T03:43:00Z", "transaction_amount_usd": 2422534.32 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "rapid_burst", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.407, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 3744337.97, "financial_exposure_usd": 6323732.17, "recoverable_pct": 0.482 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103450", "label": "fraudulent", "label_confidence": 0.634, "severity": "low", "timestamp": "2026-01-03T09:30:00Z", "trace_id": "e8a0fc69-e133-6e5b-8e3c-4814e9d6c0de" }
{ "account_age_days": 1071, "account_id": "ACCT-E5DA052F6CF1", "baseline_risk_score": 0.372, "kyc_tier": "tier_1", "session_entropy": 0.715 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "AE", "latency_ms": 1109, "timestamp": "2026-01-03T09:30:00Z", "transaction_amount_usd": 988565.22 }, { "asset": "BTC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.451, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2475494.78, "financial_exposure_usd": 5968224.96, "recoverable_pct": 0.923 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100442", "label": "fraudulent", "label_confidence": 0.782, "severity": "medium", "timestamp": "2026-01-01T07:22:00Z", "trace_id": "11813a48-5f61-0696-730e-86586af8a1a0" }
{ "account_age_days": 51, "account_id": "ACCT-4A422EBDD16C", "baseline_risk_score": 0.516, "kyc_tier": "tier_3", "session_entropy": 0.386 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 962, "timestamp": "2026-01-01T07:22:00Z", "transaction_amount_usd": 59225.1 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.948, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 4", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 546570.77, "financial_exposure_usd": 724979.16, "recoverable_pct": 0.027 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107856", "label": "benign", "label_confidence": 0.732, "severity": "low", "timestamp": "2026-01-06T10:56:00Z", "trace_id": "e13719f2-9e3f-36bc-8cd4-e7490bc37e69" }
{ "account_age_days": 1948, "account_id": "ACCT-43CEB92FC30C", "baseline_risk_score": 0.16, "kyc_tier": "tier_2", "session_entropy": 0.136 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 765, "timestamp": "2026-01-06T10:56:00Z", "transaction_amount_usd": 8622.11 }, { "asset": "EUR", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.618, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 342.29, "financial_exposure_usd": 642.02, "recoverable_pct": 0.502 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100923", "label": "fraudulent", "label_confidence": 0.949, "severity": "medium", "timestamp": "2026-01-01T15:23:00Z", "trace_id": "cbf27106-69bd-869f-9082-575e10ac6b96" }
{ "account_age_days": 1629, "account_id": "ACCT-C4EE633F04B8", "baseline_risk_score": 0.595, "kyc_tier": "tier_2", "session_entropy": 0.427 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 103, "timestamp": "2026-01-01T05:50:00Z", "transaction_amount_usd": 23.64 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.891, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 711209.33, "financial_exposure_usd": 1218920.62, "recoverable_pct": 0.098 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107448", "label": "benign", "label_confidence": 0.495, "severity": "low", "timestamp": "2026-01-06T04:08:00Z", "trace_id": "88b54a55-ca83-94a8-faec-636e0c11f42d" }
{ "account_age_days": 742, "account_id": "ACCT-68F4A7BC62A4", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.252 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 365, "timestamp": "2026-01-06T04:08:00Z", "transaction_amount_usd": 4423.37 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.725, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 1337.19, "financial_exposure_usd": 1844.61, "recoverable_pct": 0.96 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100483", "label": "fraudulent", "label_confidence": 0.928, "severity": "critical", "timestamp": "2026-01-01T08:03:00Z", "trace_id": "dd7fd5d5-70b4-c0d9-8a73-80fd4df1a4ad" }
{ "account_age_days": 468, "account_id": "ACCT-0A0A7A8AC2B6", "baseline_risk_score": 0.435, "kyc_tier": "tier_2", "session_entropy": 0.723 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "RU", "latency_ms": 666, "timestamp": "2026-01-01T08:03:00Z", "transaction_amount_usd": 21532.29 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.61, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 300006.44, "financial_exposure_usd": 614789.09, "recoverable_pct": 0.126 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101645", "label": "fraudulent", "label_confidence": 0.754, "severity": "low", "timestamp": "2026-01-02T03:25:00Z", "trace_id": "77939532-65a7-8b3c-a457-f69f70befe42" }
{ "account_age_days": 1479, "account_id": "ACCT-E75141B23B81", "baseline_risk_score": 0.48, "kyc_tier": "tier_3", "session_entropy": 0.469 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1111, "timestamp": "2026-01-02T03:25:00Z", "transaction_amount_usd": 85087.28 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE",...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.385, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 4", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 461975.31, "financial_exposure_usd": 655890.2, "recoverable_pct": 0.44 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101489", "label": "fraudulent", "label_confidence": 0.864, "severity": "high", "timestamp": "2026-01-02T00:49:00Z", "trace_id": "2b6f0dfc-52bc-f2e1-4c61-54ff6fd8fd64" }
{ "account_age_days": 1501, "account_id": "ACCT-4B6D5ED8C80B", "baseline_risk_score": 0.469, "kyc_tier": "tier_2", "session_entropy": 0.647 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 114, "timestamp": "2026-01-01T16:05:00Z", "transaction_amount_usd": 18.94 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.65, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING...
{ "customer_funds_at_risk_usd": 342065.48, "financial_exposure_usd": 462970.69, "recoverable_pct": 0.699 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105706", "label": "fraudulent", "label_confidence": 0.723, "severity": "low", "timestamp": "2026-01-04T23:06:00Z", "trace_id": "b76f30fa-cb73-d5a1-55a3-3f3df4d36cc2" }
{ "account_age_days": 599, "account_id": "ACCT-EA7CF667C1DB", "baseline_risk_score": 0.289, "kyc_tier": "tier_2", "session_entropy": 0.886 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "DE", "latency_ms": 119, "timestamp": "2026-01-04T16:59:00Z", "transaction_amount_usd": 15.49 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.528, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 2340629.83, "financial_exposure_usd": 4543677.42, "recoverable_pct": 0.642 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102564", "label": "fraudulent", "label_confidence": 0.769, "severity": "high", "timestamp": "2026-01-02T18:44:00Z", "trace_id": "2a3832e4-67c2-1279-ade0-547bf2b2e36a" }
{ "account_age_days": 1233, "account_id": "ACCT-3A4195F8970D", "baseline_risk_score": 0.496, "kyc_tier": "tier_2", "session_entropy": 0.343 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 138, "timestamp": "2026-01-02T14:54:00Z", "transaction_amount_usd": 24.34 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.793, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 835544.62, "financial_exposure_usd": 876387.61, "recoverable_pct": 0.122 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104511", "label": "fraudulent", "label_confidence": 0.917, "severity": "low", "timestamp": "2026-01-04T03:11:00Z", "trace_id": "0d7916bc-2e9c-b257-b956-28082ec4f28a" }
{ "account_age_days": 692, "account_id": "ACCT-B7ECEE4BFF1A", "baseline_risk_score": 0.444, "kyc_tier": "tier_1", "session_entropy": 0.568 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NL", "latency_ms": 224, "timestamp": "2026-01-04T00:18:00Z", "transaction_amount_usd": 8.33 }, { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.649, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2666995.76, "financial_exposure_usd": 3527738.37, "recoverable_pct": 0.817 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108783", "label": "benign", "label_confidence": 0.682, "severity": "high", "timestamp": "2026-01-07T02:23:00Z", "trace_id": "27f49d2a-7c7c-37e0-7bdc-cbc230d9c3f4" }
{ "account_age_days": 648, "account_id": "ACCT-8D45D5068C1E", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.526 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 1160, "timestamp": "2026-01-07T02:23:00Z", "transaction_amount_usd": 12917.63 }, { "asset": "USDC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG",...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.6, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra...
{ "customer_funds_at_risk_usd": 1183.95, "financial_exposure_usd": 1921.3, "recoverable_pct": 0.516 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101156", "label": "fraudulent", "label_confidence": 0.766, "severity": "medium", "timestamp": "2026-01-01T19:16:00Z", "trace_id": "dca6e424-0018-d327-4e25-49b73f4471c7" }
{ "account_age_days": 1996, "account_id": "ACCT-C674C2D88C90", "baseline_risk_score": 0.604, "kyc_tier": "tier_3", "session_entropy": 0.426 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 214, "timestamp": "2026-01-01T19:16:00Z", "transaction_amount_usd": 51101.95 }, { "asset": "EUR", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.815, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 697299.96, "financial_exposure_usd": 1092328.2, "recoverable_pct": 0.821 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106310", "label": "fraudulent", "label_confidence": 0.607, "severity": "medium", "timestamp": "2026-01-05T09:10:00Z", "trace_id": "3dce44b2-ac10-46bd-dcf9-7fbeec5b98ab" }
{ "account_age_days": 970, "account_id": "ACCT-E2A89BCF8B42", "baseline_risk_score": 0.399, "kyc_tier": "tier_3", "session_entropy": 0.729 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "KY", "latency_ms": 1063, "timestamp": "2026-01-05T09:10:00Z", "transaction_amount_usd": 2458011.33 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.677, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 305409.29, "financial_exposure_usd": 617056.26, "recoverable_pct": 0.638 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100075", "label": "fraudulent", "label_confidence": 0.909, "severity": "low", "timestamp": "2026-01-01T01:15:00Z", "trace_id": "f5e90352-3745-39f2-f1d1-88b913f39289" }
{ "account_age_days": 1899, "account_id": "ACCT-82E2B02D8DBC", "baseline_risk_score": 0.579, "kyc_tier": "tier_3", "session_entropy": 0.573 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 371, "timestamp": "2025-12-31T15:48:00Z", "transaction_amount_usd": 4.83 }, { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.407, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 418362.64, "financial_exposure_usd": 682046.14, "recoverable_pct": 0.118 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106011", "label": "fraudulent", "label_confidence": 0.701, "severity": "high", "timestamp": "2026-01-05T04:11:00Z", "trace_id": "7fca7bec-0e7e-4bb5-0502-e6ffdb8a6db5" }
{ "account_age_days": 1941, "account_id": "ACCT-F00233282C6A", "baseline_risk_score": 0.139, "kyc_tier": "tier_1", "session_entropy": 0.748 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "HK", "latency_ms": 1009, "timestamp": "2026-01-05T04:11:00Z", "transaction_amount_usd": 2205221.77 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_B...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.644, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3425415.66, "financial_exposure_usd": 5309703.68, "recoverable_pct": 0.422 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108036", "label": "benign", "label_confidence": 0.52, "severity": "medium", "timestamp": "2026-01-06T13:56:00Z", "trace_id": "46053d11-e287-4d7a-4294-8b0f6f7cc016" }
{ "account_age_days": 737, "account_id": "ACCT-B19333C0EBD0", "baseline_risk_score": 0.05, "kyc_tier": "tier_3", "session_entropy": 0.881 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "RU", "latency_ms": 262, "timestamp": "2026-01-06T08:13:00Z", "transaction_amount_usd": 23.64 }, { "asset": "USD", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.753, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 3641.83, "financial_exposure_usd": 5161.38, "recoverable_pct": 0.705 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-108429", "label": "benign", "label_confidence": 0.598, "severity": "high", "timestamp": "2026-01-06T20:29:00Z", "trace_id": "b2a871a3-a69c-6ab8-f8e7-16cc5ed72dca" }
{ "account_age_days": 387, "account_id": "ACCT-CF305D8246EA", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.471 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "TH", "latency_ms": 547, "timestamp": "2026-01-06T20:29:00Z", "transaction_amount_usd": 12897.98 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.726, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p...
{ "customer_funds_at_risk_usd": 4882.35, "financial_exposure_usd": 4898.77, "recoverable_pct": 0.728 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109675", "label": "benign", "label_confidence": 0.684, "severity": "low", "timestamp": "2026-01-07T17:15:00Z", "trace_id": "a820e0c0-8c70-c2ef-232f-b8da3d668692" }
{ "account_age_days": 1702, "account_id": "ACCT-87322CCFE2DB", "baseline_risk_score": 0.05, "kyc_tier": "tier_1", "session_entropy": 0.51 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "NG", "latency_ms": 368, "timestamp": "2026-01-07T08:54:00Z", "transaction_amount_usd": 16.52 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.579, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 3998.09, "financial_exposure_usd": 6019.16, "recoverable_pct": 0.627 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105292", "label": "fraudulent", "label_confidence": 0.926, "severity": "high", "timestamp": "2026-01-04T16:12:00Z", "trace_id": "5c054e47-1948-ec5f-5374-c2900dfa0174" }
{ "account_age_days": 1241, "account_id": "ACCT-2C4E72EDA51F", "baseline_risk_score": 0.424, "kyc_tier": "tier_3", "session_entropy": 0.275 }
[ { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "NL", "latency_ms": 1196, "timestamp": "2026-01-04T16:12:00Z", "transaction_amount_usd": 2620790.83 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.419, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2934073.65, "financial_exposure_usd": 3445625.74, "recoverable_pct": 0.425 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103636", "label": "fraudulent", "label_confidence": 0.67, "severity": "critical", "timestamp": "2026-01-03T12:36:00Z", "trace_id": "b1385d55-4c0a-d502-ea86-22058cdddc4c" }
{ "account_age_days": 716, "account_id": "ACCT-1E96C09E271D", "baseline_risk_score": 0.391, "kyc_tier": "tier_2", "session_entropy": 0.805 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CH", "latency_ms": 176, "timestamp": "2026-01-03T05:38:00Z", "transaction_amount_usd": 16.12 }, { "asset": "USD", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTE...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.601, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2415478.36, "financial_exposure_usd": 4311978.44, "recoverable_pct": 0.935 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103901", "label": "fraudulent", "label_confidence": 0.639, "severity": "high", "timestamp": "2026-01-03T17:01:00Z", "trace_id": "d5e3218d-af00-f0d8-dd2b-1d44fa271fc0" }
{ "account_age_days": 1728, "account_id": "ACCT-A1023A4E87C4", "baseline_risk_score": 0.421, "kyc_tier": "tier_3", "session_entropy": 0.452 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "DE", "latency_ms": 625, "timestamp": "2026-01-03T17:01:00Z", "transaction_amount_usd": 184508.62 }, { "asset": "ETH", "burst_indicator": false, "event_name": "ORDER_BOOK_...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.88, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 7262385.28, "financial_exposure_usd": 7848827.34, "recoverable_pct": 0.665 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106921", "label": "benign", "label_confidence": 0.69, "severity": "medium", "timestamp": "2026-01-05T19:21:00Z", "trace_id": "ece2dda1-d85f-60ad-17cc-086db04ee00b" }
{ "account_age_days": 11, "account_id": "ACCT-775150A92ECF", "baseline_risk_score": 0.103, "kyc_tier": "tier_3", "session_entropy": 0.302 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "IT", "latency_ms": 1035, "timestamp": "2026-01-05T19:21:00Z", "transaction_amount_usd": 1856.84 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.69, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr...
{ "customer_funds_at_risk_usd": 5117.86, "financial_exposure_usd": 6204.24, "recoverable_pct": 0.656 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102112", "label": "fraudulent", "label_confidence": 0.918, "severity": "high", "timestamp": "2026-01-02T11:12:00Z", "trace_id": "d9c4ff04-c6e8-ca48-e6d6-094596c95373" }
{ "account_age_days": 1499, "account_id": "ACCT-CD200805C0A8", "baseline_risk_score": 0.617, "kyc_tier": "tier_1", "session_entropy": 0.744 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "VE", "latency_ms": 1156, "timestamp": "2026-01-02T11:12:00Z", "transaction_amount_usd": 25386.11 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.909, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 52784.81, "financial_exposure_usd": 59413.5, "recoverable_pct": 0.645 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100575", "label": "fraudulent", "label_confidence": 0.948, "severity": "high", "timestamp": "2026-01-01T09:35:00Z", "trace_id": "277be5e2-1643-0826-48e7-24e4c7bb0252" }
{ "account_age_days": 653, "account_id": "ACCT-7D36DF8E6875", "baseline_risk_score": 0.365, "kyc_tier": "tier_2", "session_entropy": 0.507 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "AE", "latency_ms": 550, "timestamp": "2026-01-01T09:35:00Z", "transaction_amount_usd": 50100.67 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.841, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 3", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 1050986.6, "financial_exposure_usd": 1381746.28, "recoverable_pct": 0.065 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103021", "label": "fraudulent", "label_confidence": 0.875, "severity": "high", "timestamp": "2026-01-03T02:21:00Z", "trace_id": "77207318-7ee3-5528-46e2-c4817007cf62" }
{ "account_age_days": 1666, "account_id": "ACCT-E95FD9707F4C", "baseline_risk_score": 0.371, "kyc_tier": "tier_1", "session_entropy": 0.417 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 125, "timestamp": "2026-01-02T21:17:00Z", "transaction_amount_usd": 17.93 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.467, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 7", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI...
{ "customer_funds_at_risk_usd": 237804.43, "financial_exposure_usd": 428642.03, "recoverable_pct": 0.081 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103637", "label": "fraudulent", "label_confidence": 0.695, "severity": "medium", "timestamp": "2026-01-03T12:37:00Z", "trace_id": "ef6eb9c9-700e-ca9e-dd60-f272c1102796" }
{ "account_age_days": 1316, "account_id": "ACCT-60A1BA46520A", "baseline_risk_score": 0.062, "kyc_tier": "tier_1", "session_entropy": 0.815 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "GB", "latency_ms": 734, "timestamp": "2026-01-03T12:37:00Z", "transaction_amount_usd": 823484.5 }, { "asset": "USD", "burst_indicator": false, "event_name": "ORDER_BOOK_I...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.523, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 3406126.14, "financial_exposure_usd": 5039222.21, "recoverable_pct": 0.874 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106563", "label": "fraudulent", "label_confidence": 0.928, "severity": "critical", "timestamp": "2026-01-05T13:23:00Z", "trace_id": "71c1f121-9e7f-1367-e4bc-f300255f4dca" }
{ "account_age_days": 1845, "account_id": "ACCT-C9CF05C38EC6", "baseline_risk_score": 0.093, "kyc_tier": "tier_3", "session_entropy": 0.338 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 359, "timestamp": "2026-01-05T01:43:00Z", "transaction_amount_usd": 1.98 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.652, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 1601989.4, "financial_exposure_usd": 2153188.25, "recoverable_pct": 0.845 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100228", "label": "fraudulent", "label_confidence": 0.892, "severity": "medium", "timestamp": "2026-01-01T03:48:00Z", "trace_id": "4ed992e0-1e44-15f4-5ed1-3afef006296b" }
{ "account_age_days": 136, "account_id": "ACCT-9CDC546CD4F0", "baseline_risk_score": 0.487, "kyc_tier": "tier_2", "session_entropy": 0.342 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 910, "timestamp": "2026-01-01T03:48:00Z", "transaction_amount_usd": 119736.92 }, { "asset": "BTC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.861, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 584011.39, "financial_exposure_usd": 742942.92, "recoverable_pct": 0.595 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-103311", "label": "fraudulent", "label_confidence": 0.888, "severity": "low", "timestamp": "2026-01-03T07:11:00Z", "trace_id": "734a204a-456d-50ed-dd32-f4e416116c29" }
{ "account_age_days": 617, "account_id": "ACCT-9AF01DB901C2", "baseline_risk_score": 0.464, "kyc_tier": "tier_1", "session_entropy": 0.514 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "JP", "latency_ms": 143, "timestamp": "2026-01-02T22:51:00Z", "transaction_amount_usd": 12.43 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.414, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 497187.83, "financial_exposure_usd": 729526.17, "recoverable_pct": 0.485 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105809", "label": "fraudulent", "label_confidence": 0.617, "severity": "medium", "timestamp": "2026-01-05T00:49:00Z", "trace_id": "c56b5d31-5525-7fbf-5328-7d34cf2202fd" }
{ "account_age_days": 883, "account_id": "ACCT-93D2E88DB060", "baseline_risk_score": 0.396, "kyc_tier": "tier_1", "session_entropy": 0.51 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CH", "latency_ms": 219, "timestamp": "2026-01-05T00:49:00Z", "transaction_amount_usd": 2468149.96 }, { "asset": "SOL", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.543, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 4110805.07, "financial_exposure_usd": 4836396.74, "recoverable_pct": 0.544 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-105877", "label": "fraudulent", "label_confidence": 0.905, "severity": "medium", "timestamp": "2026-01-05T01:57:00Z", "trace_id": "75d592c4-f096-e889-ab2a-78597ecdb511" }
{ "account_age_days": 931, "account_id": "ACCT-5B12D9CD51F1", "baseline_risk_score": 0.085, "kyc_tier": "tier_1", "session_entropy": 0.262 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "US", "latency_ms": 262, "timestamp": "2026-01-04T17:08:00Z", "transaction_amount_usd": 2.36 }, { "asset": "USDT", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.398, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos...
{ "customer_funds_at_risk_usd": 1421018.96, "financial_exposure_usd": 2750270.64, "recoverable_pct": 0.736 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107238", "label": "benign", "label_confidence": 0.722, "severity": "high", "timestamp": "2026-01-06T00:38:00Z", "trace_id": "ec808ccc-1bd7-b711-031a-164b4ba4111d" }
{ "account_age_days": 1787, "account_id": "ACCT-2927251DFEC2", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.895 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "PK", "latency_ms": 80, "timestamp": "2026-01-05T21:12:00Z", "transaction_amount_usd": 14.59 }, { "asset": "EUR", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.609, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 3403.22, "financial_exposure_usd": 7113.06, "recoverable_pct": 0.505 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106324", "label": "fraudulent", "label_confidence": 0.842, "severity": "critical", "timestamp": "2026-01-05T09:24:00Z", "trace_id": "c0d5ab05-c5c5-f1fb-1a53-5090b3df54ba" }
{ "account_age_days": 444, "account_id": "ACCT-59F8289A9B7A", "baseline_risk_score": 0.183, "kyc_tier": "tier_1", "session_entropy": 0.925 }
[ { "asset": "EUR", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "BR", "latency_ms": 863, "timestamp": "2026-01-05T09:24:00Z", "transaction_amount_usd": 1742197.98 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.669, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A...
{ "customer_funds_at_risk_usd": 2477998.13, "financial_exposure_usd": 4278027.03, "recoverable_pct": 0.812 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102213", "label": "fraudulent", "label_confidence": 0.852, "severity": "low", "timestamp": "2026-01-02T12:53:00Z", "trace_id": "4e67bd10-6569-57de-d492-354285738a64" }
{ "account_age_days": 1751, "account_id": "ACCT-C6133D47BA33", "baseline_risk_score": 0.382, "kyc_tier": "tier_1", "session_entropy": 0.842 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CN", "latency_ms": 220, "timestamp": "2026-01-02T12:53:00Z", "transaction_amount_usd": 106959.19 }, { "asset": "GBP", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.686, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 954557.75, "financial_exposure_usd": 1198379.62, "recoverable_pct": 0.493 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-106294", "label": "fraudulent", "label_confidence": 0.837, "severity": "high", "timestamp": "2026-01-05T08:54:00Z", "trace_id": "e973f9ef-2a75-0819-1b9e-3d0c92074b7e" }
{ "account_age_days": 1194, "account_id": "ACCT-B675FFBF5904", "baseline_risk_score": 0.309, "kyc_tier": "tier_2", "session_entropy": 0.404 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "VE", "latency_ms": 803, "timestamp": "2026-01-05T08:54:00Z", "transaction_amount_usd": 473713.3 }, { "asset": "USDC", "burst_indicator": false, "event_name": "ORDER_BOOK...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.365, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3546621.15, "financial_exposure_usd": 3816938.05, "recoverable_pct": 0.486 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104333", "label": "fraudulent", "label_confidence": 0.816, "severity": "high", "timestamp": "2026-01-04T00:13:00Z", "trace_id": "f72f213b-b764-0e33-e137-3baac2a10916" }
{ "account_age_days": 150, "account_id": "ACCT-FAE5F26E0981", "baseline_risk_score": 0.247, "kyc_tier": "tier_3", "session_entropy": 0.949 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 127, "timestamp": "2026-01-03T22:07:00Z", "transaction_amount_usd": 9.63 }, { "asset": "ETH", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.629, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 4688343.9, "financial_exposure_usd": 5863899.31, "recoverable_pct": 0.432 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101533", "label": "fraudulent", "label_confidence": 0.899, "severity": "medium", "timestamp": "2026-01-02T01:33:00Z", "trace_id": "d55240fc-ad2b-7be3-0ce8-a8ee5bebc52c" }
{ "account_age_days": 413, "account_id": "ACCT-86EAA32DDE73", "baseline_risk_score": 0.461, "kyc_tier": "tier_2", "session_entropy": 0.95 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 320, "timestamp": "2026-01-01T21:21:00Z", "transaction_amount_usd": 20.91 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.501, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 178547.44, "financial_exposure_usd": 343365.65, "recoverable_pct": 0.184 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-109964", "label": "benign", "label_confidence": 0.534, "severity": "low", "timestamp": "2026-01-07T22:04:00Z", "trace_id": "bbb89e04-8712-c8f1-4e36-c3f8c642210c" }
{ "account_age_days": 1491, "account_id": "ACCT-19D2D118FFCF", "baseline_risk_score": 0.131, "kyc_tier": "tier_1", "session_entropy": 0.154 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "PT", "latency_ms": 225, "timestamp": "2026-01-07T22:04:00Z", "transaction_amount_usd": 10830.27 }, { "asset": "BTC", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.485, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "high", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_...
{ "customer_funds_at_risk_usd": 2147.13, "financial_exposure_usd": 5099.24, "recoverable_pct": 0.728 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104995", "label": "fraudulent", "label_confidence": 0.747, "severity": "high", "timestamp": "2026-01-04T11:15:00Z", "trace_id": "fedf18d8-d655-e994-678b-a20bf0bf26b2" }
{ "account_age_days": 1844, "account_id": "ACCT-FC717D9FCB24", "baseline_risk_score": 0.426, "kyc_tier": "tier_2", "session_entropy": 0.174 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "AE", "latency_ms": 283, "timestamp": "2026-01-04T03:11:00Z", "transaction_amount_usd": 2.43 }, { "asset": "SOL", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "order_book_spoof", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.898, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 3511716.18, "financial_exposure_usd": 4013976.86, "recoverable_pct": 0.802 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107156", "label": "benign", "label_confidence": 0.633, "severity": "high", "timestamp": "2026-01-05T23:16:00Z", "trace_id": "f870a347-919d-2b76-c51d-762308dc5023" }
{ "account_age_days": 286, "account_id": "ACCT-040566D85338", "baseline_risk_score": 0.145, "kyc_tier": "tier_3", "session_entropy": 0.635 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "VE", "latency_ms": 287, "timestamp": "2026-01-05T18:20:00Z", "transaction_amount_usd": 7.77 }, { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.655, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 4446.89, "financial_exposure_usd": 5669.82, "recoverable_pct": 0.979 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104991", "label": "fraudulent", "label_confidence": 0.872, "severity": "critical", "timestamp": "2026-01-04T11:11:00Z", "trace_id": "f777c816-8e3e-2e6d-951e-b0ffbc84c75d" }
{ "account_age_days": 426, "account_id": "ACCT-C4649C73FBD5", "baseline_risk_score": 0.286, "kyc_tier": "tier_1", "session_entropy": 0.846 }
[ { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "GB", "latency_ms": 90, "timestamp": "2026-01-04T09:35:00Z", "transaction_amount_usd": 17.44 }, { "asset": "JPY", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED"...
{ "exposure_vector": "session_hijack", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.712, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8", "confidence_band": "high", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po...
{ "customer_funds_at_risk_usd": 2872624.85, "financial_exposure_usd": 4654030.35, "recoverable_pct": 0.668 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102251", "label": "fraudulent", "label_confidence": 0.813, "severity": "critical", "timestamp": "2026-01-02T13:31:00Z", "trace_id": "4032e22b-285d-aba4-1c2c-ffc183755197" }
{ "account_age_days": 559, "account_id": "ACCT-BAC22EA735E9", "baseline_risk_score": 0.315, "kyc_tier": "tier_3", "session_entropy": 0.672 }
[ { "asset": "USDT", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "PK", "latency_ms": 1175, "timestamp": "2026-01-02T13:31:00Z", "transaction_amount_usd": 118932.43 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE"...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.475, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 410103.65, "financial_exposure_usd": 549768.25, "recoverable_pct": 0.153 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100142", "label": "fraudulent", "label_confidence": 0.791, "severity": "high", "timestamp": "2026-01-01T02:22:00Z", "trace_id": "a4752fa7-0d30-69bf-ca66-28a8df96048a" }
{ "account_age_days": 580, "account_id": "ACCT-BABF3375F17F", "baseline_risk_score": 0.576, "kyc_tier": "tier_1", "session_entropy": 0.253 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "KY", "latency_ms": 835, "timestamp": "2026-01-01T02:22:00Z", "transaction_amount_usd": 25591.7 }, { "asset": "USD", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.448, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 388663.82, "financial_exposure_usd": 436455.96, "recoverable_pct": 0.584 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107652", "label": "benign", "label_confidence": 0.581, "severity": "low", "timestamp": "2026-01-06T07:32:00Z", "trace_id": "6876b958-6d97-885e-dc5a-bf666695e12d" }
{ "account_age_days": 1441, "account_id": "ACCT-64C92E1E4674", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.451 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "HK", "latency_ms": 333, "timestamp": "2026-01-05T22:08:00Z", "transaction_amount_usd": 4.85 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.758, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t...
{ "customer_funds_at_risk_usd": 1986.99, "financial_exposure_usd": 4398.39, "recoverable_pct": 0.943 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102202", "label": "fraudulent", "label_confidence": 0.91, "severity": "critical", "timestamp": "2026-01-02T12:42:00Z", "trace_id": "f5ca1b7e-691a-94bd-8fab-c8e673aca360" }
{ "account_age_days": 176, "account_id": "ACCT-C283EEB203FA", "baseline_risk_score": 0.598, "kyc_tier": "tier_3", "session_entropy": 0.415 }
[ { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "CH", "latency_ms": 668, "timestamp": "2026-01-02T12:42:00Z", "transaction_amount_usd": 55114.35 }, { "asset": "ETH", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "credential_abuse", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.938, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 5", "confidence_band": "very_high", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id...
{ "customer_funds_at_risk_usd": 341470.35, "financial_exposure_usd": 440401.18, "recoverable_pct": 0.017 }
{ "chaos_profile": "Temporal_Burst_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-107709", "label": "benign", "label_confidence": 0.702, "severity": "high", "timestamp": "2026-01-06T08:29:00Z", "trace_id": "5009a244-e4dd-2a4c-dca4-958aa16225af" }
{ "account_age_days": 497, "account_id": "ACCT-A93F28C63BA4", "baseline_risk_score": 0.05, "kyc_tier": "tier_2", "session_entropy": 0.173 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "LOGIN_NEW_COUNTRY", "geo_country": "ID", "latency_ms": 887, "timestamp": "2026-01-06T08:29:00Z", "transaction_amount_usd": 13681.07 }, { "asset": "USD", "burst_indicator": false, "event_name": "KYC_REVIEW_FLAG", ...
{ "exposure_vector": "benign_travel_pattern", "fraud_class": "Legitimate_High_Risk_Activity", "scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign." }
{ "anomaly_score": 0.461, "anomaly_type": "geo_travel_with_elevated_spend", "baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio...
{ "customer_funds_at_risk_usd": 1182.58, "financial_exposure_usd": 2208.66, "recoverable_pct": 0.738 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "benign", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100208", "label": "fraudulent", "label_confidence": 0.771, "severity": "medium", "timestamp": "2026-01-01T03:28:00Z", "trace_id": "ac01e53d-b1fe-69b8-0936-312c636dfeba" }
{ "account_age_days": 1471, "account_id": "ACCT-3BAADA26AF83", "baseline_risk_score": 0.537, "kyc_tier": "tier_1", "session_entropy": 0.279 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "NG", "latency_ms": 780, "timestamp": "2026-01-01T03:28:00Z", "transaction_amount_usd": 40608.37 }, { "asset": "USDC", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "rapid_burst", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.542, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 5", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 267535.04, "financial_exposure_usd": 390205.24, "recoverable_pct": 0.168 }
{ "chaos_profile": "Holiday_Season_Spike", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-104829", "label": "fraudulent", "label_confidence": 0.804, "severity": "medium", "timestamp": "2026-01-04T08:29:00Z", "trace_id": "8e91dc7e-ded4-3421-c630-1b0b0284b419" }
{ "account_age_days": 206, "account_id": "ACCT-5DB22F330A7B", "baseline_risk_score": 0.372, "kyc_tier": "tier_1", "session_entropy": 0.256 }
[ { "asset": "USDC", "burst_indicator": false, "event_name": "LARGE_LIMIT_ORDER_POSTED", "geo_country": "CN", "latency_ms": 130, "timestamp": "2026-01-04T08:29:00Z", "transaction_amount_usd": 1841299.56 }, { "asset": "USDT", "burst_indicator": false, "event_name": "ORDER_BO...
{ "exposure_vector": "credential_abuse", "fraud_class": "Market_Manipulation_Spoofing", "scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution." }
{ "anomaly_score": 0.911, "anomaly_type": "cancel_burst_with_opposite_fill", "baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ...
{ "customer_funds_at_risk_usd": 621427.17, "financial_exposure_usd": 876692.49, "recoverable_pct": 0.443 }
{ "chaos_profile": "Calm_Baseline", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-100184", "label": "fraudulent", "label_confidence": 0.771, "severity": "high", "timestamp": "2026-01-01T03:04:00Z", "trace_id": "18d3ab67-1f9d-4db1-d983-dadff2e5cecf" }
{ "account_age_days": 1342, "account_id": "ACCT-99F19675BE32", "baseline_risk_score": 0.439, "kyc_tier": "tier_2", "session_entropy": 0.851 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "CN", "latency_ms": 361, "timestamp": "2025-12-31T19:45:00Z", "transaction_amount_usd": 21.62 }, { "asset": "GBP", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "...
{ "exposure_vector": "session_hijack", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.657, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 1, geo diversity 7", "confidence_band": "medium", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA...
{ "customer_funds_at_risk_usd": 52584.11, "financial_exposure_usd": 57772.96, "recoverable_pct": 0.137 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102372", "label": "fraudulent", "label_confidence": 0.913, "severity": "medium", "timestamp": "2026-01-02T15:32:00Z", "trace_id": "13294708-136e-4a35-365d-511a5118cc0f" }
{ "account_age_days": 704, "account_id": "ACCT-40BDCD9F3745", "baseline_risk_score": 0.264, "kyc_tier": "tier_1", "session_entropy": 0.166 }
[ { "asset": "ETH", "burst_indicator": false, "event_name": "LOGIN_NEW_DEVICE", "geo_country": "JP", "latency_ms": 81, "timestamp": "2026-01-02T15:32:00Z", "transaction_amount_usd": 54877.36 }, { "asset": "JPY", "burst_indicator": false, "event_name": "PASSWORD_CHANGE", ...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.495, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 3, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 89758.01, "financial_exposure_usd": 171360.95, "recoverable_pct": 0.188 }
{ "chaos_profile": "Geo_Travel_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-102616", "label": "fraudulent", "label_confidence": 0.775, "severity": "high", "timestamp": "2026-01-02T19:36:00Z", "trace_id": "0e035ea6-6cc7-fcbf-ab03-62a0fe72c87a" }
{ "account_age_days": 307, "account_id": "ACCT-E138B3B48B60", "baseline_risk_score": 0.572, "kyc_tier": "tier_3", "session_entropy": 0.688 }
[ { "asset": "BTC", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 351, "timestamp": "2026-01-02T13:26:00Z", "transaction_amount_usd": 16.02 }, { "asset": "ETH", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "g...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.795, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 4, geo diversity 7", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 513757.53, "financial_exposure_usd": 1130943.43, "recoverable_pct": 0.434 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }
1.0.0-dark-pool-sample
{ "id": "DARKPOOL-101478", "label": "fraudulent", "label_confidence": 0.925, "severity": "low", "timestamp": "2026-01-02T00:38:00Z", "trace_id": "9d98378b-a703-a0db-3987-0aefaa7acaa3" }
{ "account_age_days": 1108, "account_id": "ACCT-A383EC8BB140", "baseline_risk_score": 0.393, "kyc_tier": "tier_2", "session_entropy": 0.807 }
[ { "asset": "JPY", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "geo_country": "FR", "latency_ms": 140, "timestamp": "2026-01-01T19:15:00Z", "transaction_amount_usd": 21.2 }, { "asset": "SOL", "burst_indicator": false, "event_name": "DORMANT_CHECKIN", "ge...
{ "exposure_vector": "geo_anomaly", "fraud_class": "Account_Takeover_Sequence", "scenario_description": "Credential changes followed by rapid fund extraction from the account." }
{ "anomaly_score": 0.846, "anomaly_type": "temporal_burst_sequence", "baseline_deviation": "account_takeover: burst count 2, geo diversity 6", "confidence_band": "low", "detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN...
{ "customer_funds_at_risk_usd": 508642.63, "financial_exposure_usd": 626646.06, "recoverable_pct": 0.11 }
{ "chaos_profile": "Market_Stress_Mode", "engine": "dark_pool_sim_v1", "ground_truth_classification": "fraudulent", "synthetic": true }