schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108553",
"label": "benign",
"label_confidence": 0.604,
"severity": "low",
"timestamp": "2026-01-06T22:33:00Z",
"trace_id": "e703ce88-968b-8fa8-a909-0f564bb65f3c"
} | {
"account_age_days": 329,
"account_id": "ACCT-D0AC1EDA6B7C",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_1",
"session_entropy": 0.335
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 319,
"timestamp": "2026-01-06T16:45:00Z",
"transaction_amount_usd": 22.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.773,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1099.83,
"financial_exposure_usd": 1256.33,
"recoverable_pct": 0.974
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104800",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "high",
"timestamp": "2026-01-04T08:00:00Z",
"trace_id": "6ce083d9-0507-0eac-c507-3942e0b44f5a"
} | {
"account_age_days": 1879,
"account_id": "ACCT-247BD2F58005",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1187,
"timestamp": "2026-01-04T08:00:00Z",
"transaction_amount_usd": 1503780.67
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.866,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2460757.96,
"financial_exposure_usd": 3162792.08,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107005",
"label": "benign",
"label_confidence": 0.722,
"severity": "low",
"timestamp": "2026-01-05T20:45:00Z",
"trace_id": "4c40f2aa-7594-63a9-02f8-bd9792d8585a"
} | {
"account_age_days": 1474,
"account_id": "ACCT-22247E9AD3DC",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_1",
"session_entropy": 0.36
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 155,
"timestamp": "2026-01-05T08:24:00Z",
"transaction_amount_usd": 18.73
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.706,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1294.47,
"financial_exposure_usd": 3175.18,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102282",
"label": "fraudulent",
"label_confidence": 0.814,
"severity": "medium",
"timestamp": "2026-01-02T14:02:00Z",
"trace_id": "71989e12-2a9b-84b4-e1a3-fa8ee577d32d"
} | {
"account_age_days": 1498,
"account_id": "ACCT-1D84A3DF5BE0",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_2",
"session_entropy": 0.411
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 289,
"timestamp": "2026-01-02T14:02:00Z",
"transaction_amount_usd": 116594.13
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.501,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 574321.17,
"financial_exposure_usd": 798757.41,
"recoverable_pct": 0.351
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104051",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "medium",
"timestamp": "2026-01-03T19:31:00Z",
"trace_id": "72f5b196-116e-6d93-fa4a-9dcc3230d332"
} | {
"account_age_days": 63,
"account_id": "ACCT-95D7D402E46B",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_3",
"session_entropy": 0.443
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 752,
"timestamp": "2026-01-03T19:31:00Z",
"transaction_amount_usd": 1161156.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.849,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6007950.3,
"financial_exposure_usd": 7719415.45,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105197",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-04T14:37:00Z",
"trace_id": "70d9babd-1df9-9495-7d19-24499478ba41"
} | {
"account_age_days": 695,
"account_id": "ACCT-E1284A474CF9",
"baseline_risk_score": 0.363,
"kyc_tier": "tier_2",
"session_entropy": 0.403
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 236,
"timestamp": "2026-01-04T08:49:00Z",
"transaction_amount_usd": 6.97
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.683,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5953930.11,
"financial_exposure_usd": 6258753.16,
"recoverable_pct": 0.405
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105297",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-04T16:17:00Z",
"trace_id": "998ca8fa-f6e2-59b5-84bd-3bde6ad9eff7"
} | {
"account_age_days": 95,
"account_id": "ACCT-2D48E29C82F1",
"baseline_risk_score": 0.31,
"kyc_tier": "tier_2",
"session_entropy": 0.571
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 298,
"timestamp": "2026-01-04T13:24:00Z",
"transaction_amount_usd": 20.61
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.442,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4403529.19,
"financial_exposure_usd": 8006670.09,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101071",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "critical",
"timestamp": "2026-01-01T17:51:00Z",
"trace_id": "481ac3cf-c43c-0415-57cb-34d418726b56"
} | {
"account_age_days": 287,
"account_id": "ACCT-0ED2075907C4",
"baseline_risk_score": 0.521,
"kyc_tier": "tier_1",
"session_entropy": 0.64
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 809,
"timestamp": "2026-01-01T17:51:00Z",
"transaction_amount_usd": 25557.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.858,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 198989.12,
"financial_exposure_usd": 475711.28,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103731",
"label": "fraudulent",
"label_confidence": 0.851,
"severity": "low",
"timestamp": "2026-01-03T14:11:00Z",
"trace_id": "79ba5d27-e034-de8c-c905-e0de9e2265ee"
} | {
"account_age_days": 287,
"account_id": "ACCT-4E911A69552E",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.196
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 122,
"timestamp": "2026-01-03T08:16:00Z",
"transaction_amount_usd": 18.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.554,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3827995.89,
"financial_exposure_usd": 4232521.18,
"recoverable_pct": 0.828
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104307",
"label": "fraudulent",
"label_confidence": 0.716,
"severity": "medium",
"timestamp": "2026-01-03T23:47:00Z",
"trace_id": "f517ebf0-227b-9ab2-9af8-b7ef0480862d"
} | {
"account_age_days": 608,
"account_id": "ACCT-790AFC65764E",
"baseline_risk_score": 0.256,
"kyc_tier": "tier_3",
"session_entropy": 0.22
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1196,
"timestamp": "2026-01-03T23:47:00Z",
"transaction_amount_usd": 628028.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.668,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3084875.12,
"financial_exposure_usd": 7218653.26,
"recoverable_pct": 0.506
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102996",
"label": "fraudulent",
"label_confidence": 0.757,
"severity": "critical",
"timestamp": "2026-01-03T01:56:00Z",
"trace_id": "02a889f8-3aa9-0870-ccde-7a3de6821dfd"
} | {
"account_age_days": 396,
"account_id": "ACCT-54A9E5317CFA",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_1",
"session_entropy": 0.592
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 987,
"timestamp": "2026-01-03T01:56:00Z",
"transaction_amount_usd": 54478.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.496,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 676454.86,
"financial_exposure_usd": 750381.71,
"recoverable_pct": 0.292
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106013",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "low",
"timestamp": "2026-01-05T04:13:00Z",
"trace_id": "8bb2a04c-c1df-7587-cb61-d38794ce92e0"
} | {
"account_age_days": 500,
"account_id": "ACCT-4DAEABA86F36",
"baseline_risk_score": 0.321,
"kyc_tier": "tier_2",
"session_entropy": 0.668
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 450,
"timestamp": "2026-01-05T04:13:00Z",
"transaction_amount_usd": 738186.69
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 4568166.37,
"financial_exposure_usd": 4815321.49,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105741",
"label": "fraudulent",
"label_confidence": 0.744,
"severity": "critical",
"timestamp": "2026-01-04T23:41:00Z",
"trace_id": "93027c5a-cd77-4c1a-19af-3ea82046c7cb"
} | {
"account_age_days": 173,
"account_id": "ACCT-3F07EE8B6BAF",
"baseline_risk_score": 0.113,
"kyc_tier": "tier_1",
"session_entropy": 0.475
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 909,
"timestamp": "2026-01-04T23:41:00Z",
"transaction_amount_usd": 1368699.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.62,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 2395238.26,
"financial_exposure_usd": 4820815.34,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107031",
"label": "benign",
"label_confidence": 0.493,
"severity": "high",
"timestamp": "2026-01-05T21:11:00Z",
"trace_id": "f9fa857a-ad58-3ca1-e9f4-d9565cf4b7d5"
} | {
"account_age_days": 480,
"account_id": "ACCT-0F4F4EA331B7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.545
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 439,
"timestamp": "2026-01-05T21:11:00Z",
"transaction_amount_usd": 6629.18
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.607,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2097.24,
"financial_exposure_usd": 2111.08,
"recoverable_pct": 0.847
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101062",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "high",
"timestamp": "2026-01-01T17:42:00Z",
"trace_id": "db2ee589-b8e6-9a48-e830-ddb7f5cb676b"
} | {
"account_age_days": 1958,
"account_id": "ACCT-D34DF7500301",
"baseline_risk_score": 0.353,
"kyc_tier": "tier_2",
"session_entropy": 0.582
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 176,
"timestamp": "2026-01-01T17:42:00Z",
"transaction_amount_usd": 54902.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.506,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 575022.36,
"financial_exposure_usd": 855553.76,
"recoverable_pct": 0.367
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103720",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "critical",
"timestamp": "2026-01-03T14:00:00Z",
"trace_id": "42617625-8cd5-5563-623d-07bad72ee859"
} | {
"account_age_days": 391,
"account_id": "ACCT-E61AC62D63B1",
"baseline_risk_score": 0.175,
"kyc_tier": "tier_2",
"session_entropy": 0.77
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 406,
"timestamp": "2026-01-03T14:00:00Z",
"transaction_amount_usd": 759803.61
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.429,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2102160.94,
"financial_exposure_usd": 2679307.14,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104761",
"label": "fraudulent",
"label_confidence": 0.702,
"severity": "critical",
"timestamp": "2026-01-04T07:21:00Z",
"trace_id": "f0a668fb-b54c-f18d-fac4-c12f8fc81952"
} | {
"account_age_days": 1329,
"account_id": "ACCT-446CA1544B51",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_1",
"session_entropy": 0.889
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 893,
"timestamp": "2026-01-04T07:21:00Z",
"transaction_amount_usd": 1392603.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.604,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3008465.85,
"financial_exposure_usd": 4837595.78,
"recoverable_pct": 0.65
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109698",
"label": "benign",
"label_confidence": 0.508,
"severity": "low",
"timestamp": "2026-01-07T17:38:00Z",
"trace_id": "f80bebbf-6a65-cb21-bc6f-b51adffe62db"
} | {
"account_age_days": 286,
"account_id": "ACCT-E6E9DEF45BE8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.299
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 850,
"timestamp": "2026-01-07T17:38:00Z",
"transaction_amount_usd": 5652.3
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3834.92,
"financial_exposure_usd": 8621.15,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108467",
"label": "benign",
"label_confidence": 0.586,
"severity": "low",
"timestamp": "2026-01-06T21:07:00Z",
"trace_id": "743e1a59-1a59-0bbc-a203-e4ee0a918e44"
} | {
"account_age_days": 374,
"account_id": "ACCT-A510DC246DD1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.822
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 186,
"timestamp": "2026-01-06T20:32:00Z",
"transaction_amount_usd": 13.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.714,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1376.7,
"financial_exposure_usd": 1920.53,
"recoverable_pct": 0.965
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105777",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "medium",
"timestamp": "2026-01-05T00:17:00Z",
"trace_id": "e191237f-a0aa-f8c9-2d32-6eef6bd16bbd"
} | {
"account_age_days": 106,
"account_id": "ACCT-5835995F0BB0",
"baseline_risk_score": 0.239,
"kyc_tier": "tier_1",
"session_entropy": 0.448
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1039,
"timestamp": "2026-01-05T00:17:00Z",
"transaction_amount_usd": 337150.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.5,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 3137339.62,
"financial_exposure_usd": 3236632.87,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105934",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "high",
"timestamp": "2026-01-05T02:54:00Z",
"trace_id": "2d833225-2315-4ddb-f5a5-a648651f92b3"
} | {
"account_age_days": 1263,
"account_id": "ACCT-A9C7A72C5E76",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_1",
"session_entropy": 0.215
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 892,
"timestamp": "2026-01-05T02:54:00Z",
"transaction_amount_usd": 1755503.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4168013.43,
"financial_exposure_usd": 5167141.89,
"recoverable_pct": 0.851
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102640",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "critical",
"timestamp": "2026-01-02T20:00:00Z",
"trace_id": "621c1ba0-18fe-73e0-1710-14a408822cef"
} | {
"account_age_days": 1853,
"account_id": "ACCT-DDDA28034FFC",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.884
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 354,
"timestamp": "2026-01-02T20:00:00Z",
"transaction_amount_usd": 16333.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.533,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 443626.47,
"financial_exposure_usd": 495202.26,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103449",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "high",
"timestamp": "2026-01-03T09:29:00Z",
"trace_id": "2b1397f6-2ebe-941c-8997-5114ca18e8d6"
} | {
"account_age_days": 1436,
"account_id": "ACCT-FDB07B1F9927",
"baseline_risk_score": 0.323,
"kyc_tier": "tier_1",
"session_entropy": 0.901
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 904,
"timestamp": "2026-01-03T09:29:00Z",
"transaction_amount_usd": 1935201.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3424214.11,
"financial_exposure_usd": 5310928.08,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104549",
"label": "fraudulent",
"label_confidence": 0.627,
"severity": "high",
"timestamp": "2026-01-04T03:49:00Z",
"trace_id": "947f3c0b-eea6-35e3-ecb6-31fa3ce28d85"
} | {
"account_age_days": 1958,
"account_id": "ACCT-5FB798347156",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_3",
"session_entropy": 0.378
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 461,
"timestamp": "2026-01-04T03:49:00Z",
"transaction_amount_usd": 1183149.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.354,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4833650.53,
"financial_exposure_usd": 6100927.77,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109187",
"label": "benign",
"label_confidence": 0.479,
"severity": "critical",
"timestamp": "2026-01-07T09:07:00Z",
"trace_id": "141a6552-446b-5ec8-4b5f-39564458797e"
} | {
"account_age_days": 218,
"account_id": "ACCT-1BDE58CD7F03",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.103
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 587,
"timestamp": "2026-01-07T09:07:00Z",
"transaction_amount_usd": 6991.16
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2785.01,
"financial_exposure_usd": 3809.28,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106966",
"label": "benign",
"label_confidence": 0.689,
"severity": "low",
"timestamp": "2026-01-05T20:06:00Z",
"trace_id": "26ddbc58-5a70-48d4-9783-478202273c32"
} | {
"account_age_days": 1748,
"account_id": "ACCT-365BAB2C3B2E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.101
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 379,
"timestamp": "2026-01-05T15:45:00Z",
"transaction_amount_usd": 14.06
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2403.34,
"financial_exposure_usd": 2640.13,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102023",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "critical",
"timestamp": "2026-01-02T09:43:00Z",
"trace_id": "06b97bb0-94ed-3d3b-d229-ac0657630683"
} | {
"account_age_days": 1516,
"account_id": "ACCT-BDCD96BD74DA",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_3",
"session_entropy": 0.73
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 972,
"timestamp": "2026-01-02T09:43:00Z",
"transaction_amount_usd": 69242.73
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.642,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 510325.2,
"financial_exposure_usd": 834842.2,
"recoverable_pct": 0.353
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101813",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "low",
"timestamp": "2026-01-02T06:13:00Z",
"trace_id": "a3217d04-fc62-8f68-c1b6-4926888393b6"
} | {
"account_age_days": 57,
"account_id": "ACCT-73BCB71BD5B9",
"baseline_risk_score": 0.648,
"kyc_tier": "tier_2",
"session_entropy": 0.192
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 203,
"timestamp": "2026-01-02T06:13:00Z",
"transaction_amount_usd": 12609.76
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.698,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 737541.73,
"financial_exposure_usd": 763551.1,
"recoverable_pct": 0.04
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103934",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "critical",
"timestamp": "2026-01-03T17:34:00Z",
"trace_id": "5a059af7-4b15-d798-fb9d-361a59058dd1"
} | {
"account_age_days": 1921,
"account_id": "ACCT-B78A0E544D04",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_1",
"session_entropy": 0.662
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 194,
"timestamp": "2026-01-03T05:44:00Z",
"transaction_amount_usd": 21.63
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.596,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2899872.28,
"financial_exposure_usd": 3436410.9,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105807",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "medium",
"timestamp": "2026-01-05T00:47:00Z",
"trace_id": "9986e7ad-a189-a232-bbed-a0bd44727625"
} | {
"account_age_days": 1897,
"account_id": "ACCT-535D37279D0D",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_1",
"session_entropy": 0.458
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 228,
"timestamp": "2026-01-05T00:47:00Z",
"transaction_amount_usd": 1341971.38
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.41,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 3021331.93,
"financial_exposure_usd": 3437046.85,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104879",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "low",
"timestamp": "2026-01-04T09:19:00Z",
"trace_id": "2dfa22c8-b66d-11b6-f68f-ad1ad97060a1"
} | {
"account_age_days": 1419,
"account_id": "ACCT-C9A86D747B38",
"baseline_risk_score": 0.14,
"kyc_tier": "tier_2",
"session_entropy": 0.545
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 672,
"timestamp": "2026-01-04T09:19:00Z",
"transaction_amount_usd": 1185377.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.57,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 3074036.44,
"financial_exposure_usd": 3789991.73,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102855",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-02T23:35:00Z",
"trace_id": "9107370a-b8a2-3dab-dd3d-a58c1955b842"
} | {
"account_age_days": 1585,
"account_id": "ACCT-76EA6A64BC70",
"baseline_risk_score": 0.588,
"kyc_tier": "tier_1",
"session_entropy": 0.854
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 902,
"timestamp": "2026-01-02T23:35:00Z",
"transaction_amount_usd": 117931.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.725,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 513729.51,
"financial_exposure_usd": 678637.59,
"recoverable_pct": 0.381
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106830",
"label": "benign",
"label_confidence": 0.497,
"severity": "medium",
"timestamp": "2026-01-05T17:50:00Z",
"trace_id": "46fa7dc2-1ae5-279e-0ed4-b0cd39c39832"
} | {
"account_age_days": 777,
"account_id": "ACCT-5C9694CFBBC1",
"baseline_risk_score": 0.061,
"kyc_tier": "tier_1",
"session_entropy": 0.143
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 577,
"timestamp": "2026-01-05T17:50:00Z",
"transaction_amount_usd": 367.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1379.4,
"financial_exposure_usd": 1717.81,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107356",
"label": "benign",
"label_confidence": 0.457,
"severity": "low",
"timestamp": "2026-01-06T02:36:00Z",
"trace_id": "f55ff2ad-06ab-2041-7e76-d3fc551c24f2"
} | {
"account_age_days": 590,
"account_id": "ACCT-F83AB7DF88EB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.393
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 951,
"timestamp": "2026-01-06T02:36:00Z",
"transaction_amount_usd": 2107.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.67,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 217.88,
"financial_exposure_usd": 256.83,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103986",
"label": "fraudulent",
"label_confidence": 0.675,
"severity": "critical",
"timestamp": "2026-01-03T18:26:00Z",
"trace_id": "61c4cfba-c566-fe9b-dfee-89e88362132e"
} | {
"account_age_days": 1691,
"account_id": "ACCT-3974F5BAF4C8",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_3",
"session_entropy": 0.48
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 231,
"timestamp": "2026-01-03T13:48:00Z",
"transaction_amount_usd": 21.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.528,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2831489.61,
"financial_exposure_usd": 6127849.68,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108375",
"label": "benign",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-06T19:35:00Z",
"trace_id": "41f59e50-2873-832b-fee0-7383121bc460"
} | {
"account_age_days": 1785,
"account_id": "ACCT-AD87103832C7",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_3",
"session_entropy": 0.419
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 132,
"timestamp": "2026-01-06T17:10:00Z",
"transaction_amount_usd": 19.53
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2926.63,
"financial_exposure_usd": 5158.03,
"recoverable_pct": 0.646
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102746",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "critical",
"timestamp": "2026-01-02T21:46:00Z",
"trace_id": "79dbaa4f-f076-9450-9fc4-90b6e143abc9"
} | {
"account_age_days": 1035,
"account_id": "ACCT-78BDFD57E7ED",
"baseline_risk_score": 0.564,
"kyc_tier": "tier_3",
"session_entropy": 0.806
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 167,
"timestamp": "2026-01-02T21:46:00Z",
"transaction_amount_usd": 27410.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.392,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 231332.47,
"financial_exposure_usd": 287327.08,
"recoverable_pct": 0.12
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108843",
"label": "benign",
"label_confidence": 0.694,
"severity": "low",
"timestamp": "2026-01-07T03:23:00Z",
"trace_id": "d298ebd4-0574-53b2-d3e5-b8a762472274"
} | {
"account_age_days": 1702,
"account_id": "ACCT-DC6D7F017909",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.119
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 711,
"timestamp": "2026-01-07T03:23:00Z",
"transaction_amount_usd": 3952.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 913.45,
"financial_exposure_usd": 1952.94,
"recoverable_pct": 0.514
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102542",
"label": "fraudulent",
"label_confidence": 0.964,
"severity": "high",
"timestamp": "2026-01-02T18:22:00Z",
"trace_id": "ffa3d8c8-1afb-9b82-d4eb-ebcefc0581b7"
} | {
"account_age_days": 1737,
"account_id": "ACCT-87C9191558CD",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_3",
"session_entropy": 0.344
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "FR",
"latency_ms": 90,
"timestamp": "2026-01-02T18:22:00Z",
"transaction_amount_usd": 59410.47
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.503,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 429101.3,
"financial_exposure_usd": 743617.04,
"recoverable_pct": 0.476
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106138",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-05T06:18:00Z",
"trace_id": "0bf151b7-1b9b-0899-dfbe-43239dbfa555"
} | {
"account_age_days": 282,
"account_id": "ACCT-D872B246996B",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 488,
"timestamp": "2026-01-05T06:18:00Z",
"transaction_amount_usd": 1464401.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.363,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 8465813.34,
"financial_exposure_usd": 8997045.38,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109742",
"label": "benign",
"label_confidence": 0.579,
"severity": "low",
"timestamp": "2026-01-07T18:22:00Z",
"trace_id": "bc9db071-22e3-cc64-72e8-f53cd1f9e4f1"
} | {
"account_age_days": 517,
"account_id": "ACCT-5C987959870C",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_2",
"session_entropy": 0.425
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 400,
"timestamp": "2026-01-07T17:14:00Z",
"transaction_amount_usd": 10.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.536,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1324.73,
"financial_exposure_usd": 2223.03,
"recoverable_pct": 0.914
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101619",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "medium",
"timestamp": "2026-01-02T02:59:00Z",
"trace_id": "4e5fa7a1-aa48-b1cf-c3a9-b5e403276b4d"
} | {
"account_age_days": 1069,
"account_id": "ACCT-F5DE699F78DE",
"baseline_risk_score": 0.622,
"kyc_tier": "tier_3",
"session_entropy": 0.873
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 357,
"timestamp": "2026-01-01T22:48:00Z",
"transaction_amount_usd": 20.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.546,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 431825.23,
"financial_exposure_usd": 953995.34,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102222",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "medium",
"timestamp": "2026-01-02T13:02:00Z",
"trace_id": "200b2b3d-7132-f5aa-def4-cd93a3436548"
} | {
"account_age_days": 1901,
"account_id": "ACCT-8B00224C451F",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_2",
"session_entropy": 0.611
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 1074,
"timestamp": "2026-01-02T13:02:00Z",
"transaction_amount_usd": 65345.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.835,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 921559.86,
"financial_exposure_usd": 1157168.2,
"recoverable_pct": 0.058
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104942",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-04T10:22:00Z",
"trace_id": "7e60ffd5-db87-cf29-2d2a-afe1db75eb7b"
} | {
"account_age_days": 569,
"account_id": "ACCT-774A8782A96D",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_3",
"session_entropy": 0.215
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 122,
"timestamp": "2026-01-04T10:22:00Z",
"transaction_amount_usd": 724075.82
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.896,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1835398.42,
"financial_exposure_usd": 2339875.8,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102808",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-02T22:48:00Z",
"trace_id": "5085ed14-62bc-e1b0-d7e4-d1dd5f9698d1"
} | {
"account_age_days": 1710,
"account_id": "ACCT-8AEC429E4F5F",
"baseline_risk_score": 0.407,
"kyc_tier": "tier_2",
"session_entropy": 0.258
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 703,
"timestamp": "2026-01-02T22:48:00Z",
"transaction_amount_usd": 112402.74
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.808,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 251011.79,
"financial_exposure_usd": 571840.78,
"recoverable_pct": 0.121
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108558",
"label": "benign",
"label_confidence": 0.628,
"severity": "high",
"timestamp": "2026-01-06T22:38:00Z",
"trace_id": "82e9e527-d19d-b9bc-6156-dcf574174c28"
} | {
"account_age_days": 967,
"account_id": "ACCT-F11B6B061F81",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.172
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 804,
"timestamp": "2026-01-06T22:38:00Z",
"transaction_amount_usd": 9671.62
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.473,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 939.3,
"financial_exposure_usd": 1735.44,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104543",
"label": "fraudulent",
"label_confidence": 0.6,
"severity": "medium",
"timestamp": "2026-01-04T03:43:00Z",
"trace_id": "9ccc7f79-6dd5-9c1d-82d4-e8228a248431"
} | {
"account_age_days": 1637,
"account_id": "ACCT-3A1DABAC0AB1",
"baseline_risk_score": 0.095,
"kyc_tier": "tier_3",
"session_entropy": 0.492
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 613,
"timestamp": "2026-01-04T03:43:00Z",
"transaction_amount_usd": 2422534.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.407,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3744337.97,
"financial_exposure_usd": 6323732.17,
"recoverable_pct": 0.482
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103450",
"label": "fraudulent",
"label_confidence": 0.634,
"severity": "low",
"timestamp": "2026-01-03T09:30:00Z",
"trace_id": "e8a0fc69-e133-6e5b-8e3c-4814e9d6c0de"
} | {
"account_age_days": 1071,
"account_id": "ACCT-E5DA052F6CF1",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.715
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1109,
"timestamp": "2026-01-03T09:30:00Z",
"transaction_amount_usd": 988565.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.451,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2475494.78,
"financial_exposure_usd": 5968224.96,
"recoverable_pct": 0.923
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100442",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-01T07:22:00Z",
"trace_id": "11813a48-5f61-0696-730e-86586af8a1a0"
} | {
"account_age_days": 51,
"account_id": "ACCT-4A422EBDD16C",
"baseline_risk_score": 0.516,
"kyc_tier": "tier_3",
"session_entropy": 0.386
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 962,
"timestamp": "2026-01-01T07:22:00Z",
"transaction_amount_usd": 59225.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.948,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 546570.77,
"financial_exposure_usd": 724979.16,
"recoverable_pct": 0.027
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107856",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-06T10:56:00Z",
"trace_id": "e13719f2-9e3f-36bc-8cd4-e7490bc37e69"
} | {
"account_age_days": 1948,
"account_id": "ACCT-43CEB92FC30C",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_2",
"session_entropy": 0.136
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 765,
"timestamp": "2026-01-06T10:56:00Z",
"transaction_amount_usd": 8622.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 342.29,
"financial_exposure_usd": 642.02,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100923",
"label": "fraudulent",
"label_confidence": 0.949,
"severity": "medium",
"timestamp": "2026-01-01T15:23:00Z",
"trace_id": "cbf27106-69bd-869f-9082-575e10ac6b96"
} | {
"account_age_days": 1629,
"account_id": "ACCT-C4EE633F04B8",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_2",
"session_entropy": 0.427
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 103,
"timestamp": "2026-01-01T05:50:00Z",
"transaction_amount_usd": 23.64
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 711209.33,
"financial_exposure_usd": 1218920.62,
"recoverable_pct": 0.098
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107448",
"label": "benign",
"label_confidence": 0.495,
"severity": "low",
"timestamp": "2026-01-06T04:08:00Z",
"trace_id": "88b54a55-ca83-94a8-faec-636e0c11f42d"
} | {
"account_age_days": 742,
"account_id": "ACCT-68F4A7BC62A4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.252
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 365,
"timestamp": "2026-01-06T04:08:00Z",
"transaction_amount_usd": 4423.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.725,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1337.19,
"financial_exposure_usd": 1844.61,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100483",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-01T08:03:00Z",
"trace_id": "dd7fd5d5-70b4-c0d9-8a73-80fd4df1a4ad"
} | {
"account_age_days": 468,
"account_id": "ACCT-0A0A7A8AC2B6",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.723
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 666,
"timestamp": "2026-01-01T08:03:00Z",
"transaction_amount_usd": 21532.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.61,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 300006.44,
"financial_exposure_usd": 614789.09,
"recoverable_pct": 0.126
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101645",
"label": "fraudulent",
"label_confidence": 0.754,
"severity": "low",
"timestamp": "2026-01-02T03:25:00Z",
"trace_id": "77939532-65a7-8b3c-a457-f69f70befe42"
} | {
"account_age_days": 1479,
"account_id": "ACCT-E75141B23B81",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_3",
"session_entropy": 0.469
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1111,
"timestamp": "2026-01-02T03:25:00Z",
"transaction_amount_usd": 85087.28
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.385,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 461975.31,
"financial_exposure_usd": 655890.2,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101489",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-02T00:49:00Z",
"trace_id": "2b6f0dfc-52bc-f2e1-4c61-54ff6fd8fd64"
} | {
"account_age_days": 1501,
"account_id": "ACCT-4B6D5ED8C80B",
"baseline_risk_score": 0.469,
"kyc_tier": "tier_2",
"session_entropy": 0.647
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 114,
"timestamp": "2026-01-01T16:05:00Z",
"transaction_amount_usd": 18.94
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.65,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 342065.48,
"financial_exposure_usd": 462970.69,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105706",
"label": "fraudulent",
"label_confidence": 0.723,
"severity": "low",
"timestamp": "2026-01-04T23:06:00Z",
"trace_id": "b76f30fa-cb73-d5a1-55a3-3f3df4d36cc2"
} | {
"account_age_days": 599,
"account_id": "ACCT-EA7CF667C1DB",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.886
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 119,
"timestamp": "2026-01-04T16:59:00Z",
"transaction_amount_usd": 15.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.528,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2340629.83,
"financial_exposure_usd": 4543677.42,
"recoverable_pct": 0.642
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102564",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-02T18:44:00Z",
"trace_id": "2a3832e4-67c2-1279-ade0-547bf2b2e36a"
} | {
"account_age_days": 1233,
"account_id": "ACCT-3A4195F8970D",
"baseline_risk_score": 0.496,
"kyc_tier": "tier_2",
"session_entropy": 0.343
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 138,
"timestamp": "2026-01-02T14:54:00Z",
"transaction_amount_usd": 24.34
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 835544.62,
"financial_exposure_usd": 876387.61,
"recoverable_pct": 0.122
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104511",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "low",
"timestamp": "2026-01-04T03:11:00Z",
"trace_id": "0d7916bc-2e9c-b257-b956-28082ec4f28a"
} | {
"account_age_days": 692,
"account_id": "ACCT-B7ECEE4BFF1A",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_1",
"session_entropy": 0.568
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 224,
"timestamp": "2026-01-04T00:18:00Z",
"transaction_amount_usd": 8.33
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.649,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2666995.76,
"financial_exposure_usd": 3527738.37,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108783",
"label": "benign",
"label_confidence": 0.682,
"severity": "high",
"timestamp": "2026-01-07T02:23:00Z",
"trace_id": "27f49d2a-7c7c-37e0-7bdc-cbc230d9c3f4"
} | {
"account_age_days": 648,
"account_id": "ACCT-8D45D5068C1E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.526
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1160,
"timestamp": "2026-01-07T02:23:00Z",
"transaction_amount_usd": 12917.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 1183.95,
"financial_exposure_usd": 1921.3,
"recoverable_pct": 0.516
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101156",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "medium",
"timestamp": "2026-01-01T19:16:00Z",
"trace_id": "dca6e424-0018-d327-4e25-49b73f4471c7"
} | {
"account_age_days": 1996,
"account_id": "ACCT-C674C2D88C90",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_3",
"session_entropy": 0.426
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 214,
"timestamp": "2026-01-01T19:16:00Z",
"transaction_amount_usd": 51101.95
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 697299.96,
"financial_exposure_usd": 1092328.2,
"recoverable_pct": 0.821
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106310",
"label": "fraudulent",
"label_confidence": 0.607,
"severity": "medium",
"timestamp": "2026-01-05T09:10:00Z",
"trace_id": "3dce44b2-ac10-46bd-dcf9-7fbeec5b98ab"
} | {
"account_age_days": 970,
"account_id": "ACCT-E2A89BCF8B42",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.729
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 1063,
"timestamp": "2026-01-05T09:10:00Z",
"transaction_amount_usd": 2458011.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.677,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 305409.29,
"financial_exposure_usd": 617056.26,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100075",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "low",
"timestamp": "2026-01-01T01:15:00Z",
"trace_id": "f5e90352-3745-39f2-f1d1-88b913f39289"
} | {
"account_age_days": 1899,
"account_id": "ACCT-82E2B02D8DBC",
"baseline_risk_score": 0.579,
"kyc_tier": "tier_3",
"session_entropy": 0.573
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 371,
"timestamp": "2025-12-31T15:48:00Z",
"transaction_amount_usd": 4.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.407,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 418362.64,
"financial_exposure_usd": 682046.14,
"recoverable_pct": 0.118
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106011",
"label": "fraudulent",
"label_confidence": 0.701,
"severity": "high",
"timestamp": "2026-01-05T04:11:00Z",
"trace_id": "7fca7bec-0e7e-4bb5-0502-e6ffdb8a6db5"
} | {
"account_age_days": 1941,
"account_id": "ACCT-F00233282C6A",
"baseline_risk_score": 0.139,
"kyc_tier": "tier_1",
"session_entropy": 0.748
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 1009,
"timestamp": "2026-01-05T04:11:00Z",
"transaction_amount_usd": 2205221.77
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_B... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.644,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3425415.66,
"financial_exposure_usd": 5309703.68,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108036",
"label": "benign",
"label_confidence": 0.52,
"severity": "medium",
"timestamp": "2026-01-06T13:56:00Z",
"trace_id": "46053d11-e287-4d7a-4294-8b0f6f7cc016"
} | {
"account_age_days": 737,
"account_id": "ACCT-B19333C0EBD0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.881
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 262,
"timestamp": "2026-01-06T08:13:00Z",
"transaction_amount_usd": 23.64
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.753,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3641.83,
"financial_exposure_usd": 5161.38,
"recoverable_pct": 0.705
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108429",
"label": "benign",
"label_confidence": 0.598,
"severity": "high",
"timestamp": "2026-01-06T20:29:00Z",
"trace_id": "b2a871a3-a69c-6ab8-f8e7-16cc5ed72dca"
} | {
"account_age_days": 387,
"account_id": "ACCT-CF305D8246EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.471
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 547,
"timestamp": "2026-01-06T20:29:00Z",
"transaction_amount_usd": 12897.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.726,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4882.35,
"financial_exposure_usd": 4898.77,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109675",
"label": "benign",
"label_confidence": 0.684,
"severity": "low",
"timestamp": "2026-01-07T17:15:00Z",
"trace_id": "a820e0c0-8c70-c2ef-232f-b8da3d668692"
} | {
"account_age_days": 1702,
"account_id": "ACCT-87322CCFE2DB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.51
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 368,
"timestamp": "2026-01-07T08:54:00Z",
"transaction_amount_usd": 16.52
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.579,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3998.09,
"financial_exposure_usd": 6019.16,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105292",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "high",
"timestamp": "2026-01-04T16:12:00Z",
"trace_id": "5c054e47-1948-ec5f-5374-c2900dfa0174"
} | {
"account_age_days": 1241,
"account_id": "ACCT-2C4E72EDA51F",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.275
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1196,
"timestamp": "2026-01-04T16:12:00Z",
"transaction_amount_usd": 2620790.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.419,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2934073.65,
"financial_exposure_usd": 3445625.74,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103636",
"label": "fraudulent",
"label_confidence": 0.67,
"severity": "critical",
"timestamp": "2026-01-03T12:36:00Z",
"trace_id": "b1385d55-4c0a-d502-ea86-22058cdddc4c"
} | {
"account_age_days": 716,
"account_id": "ACCT-1E96C09E271D",
"baseline_risk_score": 0.391,
"kyc_tier": "tier_2",
"session_entropy": 0.805
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 176,
"timestamp": "2026-01-03T05:38:00Z",
"transaction_amount_usd": 16.12
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.601,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2415478.36,
"financial_exposure_usd": 4311978.44,
"recoverable_pct": 0.935
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103901",
"label": "fraudulent",
"label_confidence": 0.639,
"severity": "high",
"timestamp": "2026-01-03T17:01:00Z",
"trace_id": "d5e3218d-af00-f0d8-dd2b-1d44fa271fc0"
} | {
"account_age_days": 1728,
"account_id": "ACCT-A1023A4E87C4",
"baseline_risk_score": 0.421,
"kyc_tier": "tier_3",
"session_entropy": 0.452
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 625,
"timestamp": "2026-01-03T17:01:00Z",
"transaction_amount_usd": 184508.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.88,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 7262385.28,
"financial_exposure_usd": 7848827.34,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106921",
"label": "benign",
"label_confidence": 0.69,
"severity": "medium",
"timestamp": "2026-01-05T19:21:00Z",
"trace_id": "ece2dda1-d85f-60ad-17cc-086db04ee00b"
} | {
"account_age_days": 11,
"account_id": "ACCT-775150A92ECF",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_3",
"session_entropy": 0.302
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1035,
"timestamp": "2026-01-05T19:21:00Z",
"transaction_amount_usd": 1856.84
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 5117.86,
"financial_exposure_usd": 6204.24,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102112",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "high",
"timestamp": "2026-01-02T11:12:00Z",
"trace_id": "d9c4ff04-c6e8-ca48-e6d6-094596c95373"
} | {
"account_age_days": 1499,
"account_id": "ACCT-CD200805C0A8",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_1",
"session_entropy": 0.744
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1156,
"timestamp": "2026-01-02T11:12:00Z",
"transaction_amount_usd": 25386.11
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.909,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 52784.81,
"financial_exposure_usd": 59413.5,
"recoverable_pct": 0.645
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100575",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "high",
"timestamp": "2026-01-01T09:35:00Z",
"trace_id": "277be5e2-1643-0826-48e7-24e4c7bb0252"
} | {
"account_age_days": 653,
"account_id": "ACCT-7D36DF8E6875",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.507
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 550,
"timestamp": "2026-01-01T09:35:00Z",
"transaction_amount_usd": 50100.67
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1050986.6,
"financial_exposure_usd": 1381746.28,
"recoverable_pct": 0.065
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103021",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-03T02:21:00Z",
"trace_id": "77207318-7ee3-5528-46e2-c4817007cf62"
} | {
"account_age_days": 1666,
"account_id": "ACCT-E95FD9707F4C",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_1",
"session_entropy": 0.417
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 125,
"timestamp": "2026-01-02T21:17:00Z",
"transaction_amount_usd": 17.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.467,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 237804.43,
"financial_exposure_usd": 428642.03,
"recoverable_pct": 0.081
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103637",
"label": "fraudulent",
"label_confidence": 0.695,
"severity": "medium",
"timestamp": "2026-01-03T12:37:00Z",
"trace_id": "ef6eb9c9-700e-ca9e-dd60-f272c1102796"
} | {
"account_age_days": 1316,
"account_id": "ACCT-60A1BA46520A",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 734,
"timestamp": "2026-01-03T12:37:00Z",
"transaction_amount_usd": 823484.5
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.523,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3406126.14,
"financial_exposure_usd": 5039222.21,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106563",
"label": "fraudulent",
"label_confidence": 0.928,
"severity": "critical",
"timestamp": "2026-01-05T13:23:00Z",
"trace_id": "71c1f121-9e7f-1367-e4bc-f300255f4dca"
} | {
"account_age_days": 1845,
"account_id": "ACCT-C9CF05C38EC6",
"baseline_risk_score": 0.093,
"kyc_tier": "tier_3",
"session_entropy": 0.338
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 359,
"timestamp": "2026-01-05T01:43:00Z",
"transaction_amount_usd": 1.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.652,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1601989.4,
"financial_exposure_usd": 2153188.25,
"recoverable_pct": 0.845
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100228",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "medium",
"timestamp": "2026-01-01T03:48:00Z",
"trace_id": "4ed992e0-1e44-15f4-5ed1-3afef006296b"
} | {
"account_age_days": 136,
"account_id": "ACCT-9CDC546CD4F0",
"baseline_risk_score": 0.487,
"kyc_tier": "tier_2",
"session_entropy": 0.342
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 910,
"timestamp": "2026-01-01T03:48:00Z",
"transaction_amount_usd": 119736.92
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.861,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 584011.39,
"financial_exposure_usd": 742942.92,
"recoverable_pct": 0.595
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103311",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "low",
"timestamp": "2026-01-03T07:11:00Z",
"trace_id": "734a204a-456d-50ed-dd32-f4e416116c29"
} | {
"account_age_days": 617,
"account_id": "ACCT-9AF01DB901C2",
"baseline_risk_score": 0.464,
"kyc_tier": "tier_1",
"session_entropy": 0.514
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 143,
"timestamp": "2026-01-02T22:51:00Z",
"transaction_amount_usd": 12.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.414,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 497187.83,
"financial_exposure_usd": 729526.17,
"recoverable_pct": 0.485
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105809",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "medium",
"timestamp": "2026-01-05T00:49:00Z",
"trace_id": "c56b5d31-5525-7fbf-5328-7d34cf2202fd"
} | {
"account_age_days": 883,
"account_id": "ACCT-93D2E88DB060",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_1",
"session_entropy": 0.51
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 219,
"timestamp": "2026-01-05T00:49:00Z",
"transaction_amount_usd": 2468149.96
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.543,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4110805.07,
"financial_exposure_usd": 4836396.74,
"recoverable_pct": 0.544
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105877",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "medium",
"timestamp": "2026-01-05T01:57:00Z",
"trace_id": "75d592c4-f096-e889-ab2a-78597ecdb511"
} | {
"account_age_days": 931,
"account_id": "ACCT-5B12D9CD51F1",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 262,
"timestamp": "2026-01-04T17:08:00Z",
"transaction_amount_usd": 2.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1421018.96,
"financial_exposure_usd": 2750270.64,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107238",
"label": "benign",
"label_confidence": 0.722,
"severity": "high",
"timestamp": "2026-01-06T00:38:00Z",
"trace_id": "ec808ccc-1bd7-b711-031a-164b4ba4111d"
} | {
"account_age_days": 1787,
"account_id": "ACCT-2927251DFEC2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.895
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 80,
"timestamp": "2026-01-05T21:12:00Z",
"transaction_amount_usd": 14.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.609,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3403.22,
"financial_exposure_usd": 7113.06,
"recoverable_pct": 0.505
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106324",
"label": "fraudulent",
"label_confidence": 0.842,
"severity": "critical",
"timestamp": "2026-01-05T09:24:00Z",
"trace_id": "c0d5ab05-c5c5-f1fb-1a53-5090b3df54ba"
} | {
"account_age_days": 444,
"account_id": "ACCT-59F8289A9B7A",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_1",
"session_entropy": 0.925
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 863,
"timestamp": "2026-01-05T09:24:00Z",
"transaction_amount_usd": 1742197.98
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.669,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2477998.13,
"financial_exposure_usd": 4278027.03,
"recoverable_pct": 0.812
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102213",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "low",
"timestamp": "2026-01-02T12:53:00Z",
"trace_id": "4e67bd10-6569-57de-d492-354285738a64"
} | {
"account_age_days": 1751,
"account_id": "ACCT-C6133D47BA33",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_1",
"session_entropy": 0.842
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 220,
"timestamp": "2026-01-02T12:53:00Z",
"transaction_amount_usd": 106959.19
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.686,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 954557.75,
"financial_exposure_usd": 1198379.62,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106294",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-05T08:54:00Z",
"trace_id": "e973f9ef-2a75-0819-1b9e-3d0c92074b7e"
} | {
"account_age_days": 1194,
"account_id": "ACCT-B675FFBF5904",
"baseline_risk_score": 0.309,
"kyc_tier": "tier_2",
"session_entropy": 0.404
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 803,
"timestamp": "2026-01-05T08:54:00Z",
"transaction_amount_usd": 473713.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.365,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3546621.15,
"financial_exposure_usd": 3816938.05,
"recoverable_pct": 0.486
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104333",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-04T00:13:00Z",
"trace_id": "f72f213b-b764-0e33-e137-3baac2a10916"
} | {
"account_age_days": 150,
"account_id": "ACCT-FAE5F26E0981",
"baseline_risk_score": 0.247,
"kyc_tier": "tier_3",
"session_entropy": 0.949
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 127,
"timestamp": "2026-01-03T22:07:00Z",
"transaction_amount_usd": 9.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.629,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4688343.9,
"financial_exposure_usd": 5863899.31,
"recoverable_pct": 0.432
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101533",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-02T01:33:00Z",
"trace_id": "d55240fc-ad2b-7be3-0ce8-a8ee5bebc52c"
} | {
"account_age_days": 413,
"account_id": "ACCT-86EAA32DDE73",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_2",
"session_entropy": 0.95
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 320,
"timestamp": "2026-01-01T21:21:00Z",
"transaction_amount_usd": 20.91
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.501,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 178547.44,
"financial_exposure_usd": 343365.65,
"recoverable_pct": 0.184
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109964",
"label": "benign",
"label_confidence": 0.534,
"severity": "low",
"timestamp": "2026-01-07T22:04:00Z",
"trace_id": "bbb89e04-8712-c8f1-4e36-c3f8c642210c"
} | {
"account_age_days": 1491,
"account_id": "ACCT-19D2D118FFCF",
"baseline_risk_score": 0.131,
"kyc_tier": "tier_1",
"session_entropy": 0.154
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 225,
"timestamp": "2026-01-07T22:04:00Z",
"transaction_amount_usd": 10830.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2147.13,
"financial_exposure_usd": 5099.24,
"recoverable_pct": 0.728
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104995",
"label": "fraudulent",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-04T11:15:00Z",
"trace_id": "fedf18d8-d655-e994-678b-a20bf0bf26b2"
} | {
"account_age_days": 1844,
"account_id": "ACCT-FC717D9FCB24",
"baseline_risk_score": 0.426,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 283,
"timestamp": "2026-01-04T03:11:00Z",
"transaction_amount_usd": 2.43
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.898,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3511716.18,
"financial_exposure_usd": 4013976.86,
"recoverable_pct": 0.802
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107156",
"label": "benign",
"label_confidence": 0.633,
"severity": "high",
"timestamp": "2026-01-05T23:16:00Z",
"trace_id": "f870a347-919d-2b76-c51d-762308dc5023"
} | {
"account_age_days": 286,
"account_id": "ACCT-040566D85338",
"baseline_risk_score": 0.145,
"kyc_tier": "tier_3",
"session_entropy": 0.635
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 287,
"timestamp": "2026-01-05T18:20:00Z",
"transaction_amount_usd": 7.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4446.89,
"financial_exposure_usd": 5669.82,
"recoverable_pct": 0.979
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104991",
"label": "fraudulent",
"label_confidence": 0.872,
"severity": "critical",
"timestamp": "2026-01-04T11:11:00Z",
"trace_id": "f777c816-8e3e-2e6d-951e-b0ffbc84c75d"
} | {
"account_age_days": 426,
"account_id": "ACCT-C4649C73FBD5",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_1",
"session_entropy": 0.846
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 90,
"timestamp": "2026-01-04T09:35:00Z",
"transaction_amount_usd": 17.44
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.712,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2872624.85,
"financial_exposure_usd": 4654030.35,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102251",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "critical",
"timestamp": "2026-01-02T13:31:00Z",
"trace_id": "4032e22b-285d-aba4-1c2c-ffc183755197"
} | {
"account_age_days": 559,
"account_id": "ACCT-BAC22EA735E9",
"baseline_risk_score": 0.315,
"kyc_tier": "tier_3",
"session_entropy": 0.672
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1175,
"timestamp": "2026-01-02T13:31:00Z",
"transaction_amount_usd": 118932.43
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.475,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 410103.65,
"financial_exposure_usd": 549768.25,
"recoverable_pct": 0.153
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100142",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "high",
"timestamp": "2026-01-01T02:22:00Z",
"trace_id": "a4752fa7-0d30-69bf-ca66-28a8df96048a"
} | {
"account_age_days": 580,
"account_id": "ACCT-BABF3375F17F",
"baseline_risk_score": 0.576,
"kyc_tier": "tier_1",
"session_entropy": 0.253
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 835,
"timestamp": "2026-01-01T02:22:00Z",
"transaction_amount_usd": 25591.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.448,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 388663.82,
"financial_exposure_usd": 436455.96,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107652",
"label": "benign",
"label_confidence": 0.581,
"severity": "low",
"timestamp": "2026-01-06T07:32:00Z",
"trace_id": "6876b958-6d97-885e-dc5a-bf666695e12d"
} | {
"account_age_days": 1441,
"account_id": "ACCT-64C92E1E4674",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.451
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 333,
"timestamp": "2026-01-05T22:08:00Z",
"transaction_amount_usd": 4.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.758,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1986.99,
"financial_exposure_usd": 4398.39,
"recoverable_pct": 0.943
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102202",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "critical",
"timestamp": "2026-01-02T12:42:00Z",
"trace_id": "f5ca1b7e-691a-94bd-8fab-c8e673aca360"
} | {
"account_age_days": 176,
"account_id": "ACCT-C283EEB203FA",
"baseline_risk_score": 0.598,
"kyc_tier": "tier_3",
"session_entropy": 0.415
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 668,
"timestamp": "2026-01-02T12:42:00Z",
"transaction_amount_usd": 55114.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.938,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 341470.35,
"financial_exposure_usd": 440401.18,
"recoverable_pct": 0.017
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107709",
"label": "benign",
"label_confidence": 0.702,
"severity": "high",
"timestamp": "2026-01-06T08:29:00Z",
"trace_id": "5009a244-e4dd-2a4c-dca4-958aa16225af"
} | {
"account_age_days": 497,
"account_id": "ACCT-A93F28C63BA4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.173
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 887,
"timestamp": "2026-01-06T08:29:00Z",
"transaction_amount_usd": 13681.07
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.461,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1182.58,
"financial_exposure_usd": 2208.66,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100208",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-01T03:28:00Z",
"trace_id": "ac01e53d-b1fe-69b8-0936-312c636dfeba"
} | {
"account_age_days": 1471,
"account_id": "ACCT-3BAADA26AF83",
"baseline_risk_score": 0.537,
"kyc_tier": "tier_1",
"session_entropy": 0.279
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 780,
"timestamp": "2026-01-01T03:28:00Z",
"transaction_amount_usd": 40608.37
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.542,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 267535.04,
"financial_exposure_usd": 390205.24,
"recoverable_pct": 0.168
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104829",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "medium",
"timestamp": "2026-01-04T08:29:00Z",
"trace_id": "8e91dc7e-ded4-3421-c630-1b0b0284b419"
} | {
"account_age_days": 206,
"account_id": "ACCT-5DB22F330A7B",
"baseline_risk_score": 0.372,
"kyc_tier": "tier_1",
"session_entropy": 0.256
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 130,
"timestamp": "2026-01-04T08:29:00Z",
"transaction_amount_usd": 1841299.56
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 621427.17,
"financial_exposure_usd": 876692.49,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100184",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "high",
"timestamp": "2026-01-01T03:04:00Z",
"trace_id": "18d3ab67-1f9d-4db1-d983-dadff2e5cecf"
} | {
"account_age_days": 1342,
"account_id": "ACCT-99F19675BE32",
"baseline_risk_score": 0.439,
"kyc_tier": "tier_2",
"session_entropy": 0.851
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 361,
"timestamp": "2025-12-31T19:45:00Z",
"transaction_amount_usd": 21.62
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.657,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 52584.11,
"financial_exposure_usd": 57772.96,
"recoverable_pct": 0.137
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102372",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "medium",
"timestamp": "2026-01-02T15:32:00Z",
"trace_id": "13294708-136e-4a35-365d-511a5118cc0f"
} | {
"account_age_days": 704,
"account_id": "ACCT-40BDCD9F3745",
"baseline_risk_score": 0.264,
"kyc_tier": "tier_1",
"session_entropy": 0.166
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 81,
"timestamp": "2026-01-02T15:32:00Z",
"transaction_amount_usd": 54877.36
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.495,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 89758.01,
"financial_exposure_usd": 171360.95,
"recoverable_pct": 0.188
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102616",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "high",
"timestamp": "2026-01-02T19:36:00Z",
"trace_id": "0e035ea6-6cc7-fcbf-ab03-62a0fe72c87a"
} | {
"account_age_days": 307,
"account_id": "ACCT-E138B3B48B60",
"baseline_risk_score": 0.572,
"kyc_tier": "tier_3",
"session_entropy": 0.688
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 351,
"timestamp": "2026-01-02T13:26:00Z",
"transaction_amount_usd": 16.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.795,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 513757.53,
"financial_exposure_usd": 1130943.43,
"recoverable_pct": 0.434
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101478",
"label": "fraudulent",
"label_confidence": 0.925,
"severity": "low",
"timestamp": "2026-01-02T00:38:00Z",
"trace_id": "9d98378b-a703-a0db-3987-0aefaa7acaa3"
} | {
"account_age_days": 1108,
"account_id": "ACCT-A383EC8BB140",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_2",
"session_entropy": 0.807
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 140,
"timestamp": "2026-01-01T19:15:00Z",
"transaction_amount_usd": 21.2
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.846,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 508642.63,
"financial_exposure_usd": 626646.06,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.