schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103099",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "critical",
"timestamp": "2026-01-03T03:39:00Z",
"trace_id": "6c4850c2-32ba-553b-2a6d-c014f612a408"
} | {
"account_age_days": 1219,
"account_id": "ACCT-3FE340800684",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_1",
"session_entropy": 0.407
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 919,
"timestamp": "2026-01-03T03:39:00Z",
"transaction_amount_usd": 25786.37
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.945,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 801621.55,
"financial_exposure_usd": 914908.02,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104217",
"label": "fraudulent",
"label_confidence": 0.662,
"severity": "high",
"timestamp": "2026-01-03T22:17:00Z",
"trace_id": "00c49a0d-dd2b-dc71-a49d-3f36f96ac8b6"
} | {
"account_age_days": 1642,
"account_id": "ACCT-57B3648826E4",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.519
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 344,
"timestamp": "2026-01-03T20:10:00Z",
"transaction_amount_usd": 1.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.577,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3308788.13,
"financial_exposure_usd": 3596277.59,
"recoverable_pct": 0.909
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109062",
"label": "benign",
"label_confidence": 0.677,
"severity": "medium",
"timestamp": "2026-01-07T07:02:00Z",
"trace_id": "d9c7b9c5-5f03-24da-9c99-977f3e5ffea1"
} | {
"account_age_days": 1346,
"account_id": "ACCT-9122F075E9DC",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_2",
"session_entropy": 0.58
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 211,
"timestamp": "2026-01-07T07:02:00Z",
"transaction_amount_usd": 13507.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.552,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2004.85,
"financial_exposure_usd": 4249.22,
"recoverable_pct": 0.663
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101409",
"label": "fraudulent",
"label_confidence": 0.82,
"severity": "medium",
"timestamp": "2026-01-01T23:29:00Z",
"trace_id": "06921269-9670-05b1-d330-175b39dff284"
} | {
"account_age_days": 1645,
"account_id": "ACCT-CAE8FC6BD797",
"baseline_risk_score": 0.376,
"kyc_tier": "tier_1",
"session_entropy": 0.621
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 92,
"timestamp": "2026-01-01T12:20:00Z",
"transaction_amount_usd": 0.84
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.472,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 567433.27,
"financial_exposure_usd": 750274.73,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103502",
"label": "fraudulent",
"label_confidence": 0.86,
"severity": "low",
"timestamp": "2026-01-03T10:22:00Z",
"trace_id": "02a6242c-eb9b-6f99-9f6a-536708aad780"
} | {
"account_age_days": 590,
"account_id": "ACCT-2FE17895B0A1",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_1",
"session_entropy": 0.702
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 271,
"timestamp": "2026-01-03T10:22:00Z",
"transaction_amount_usd": 2968983.77
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1012948.33,
"financial_exposure_usd": 2310255.71,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104373",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "high",
"timestamp": "2026-01-04T00:53:00Z",
"trace_id": "9cd3f5ac-b917-8694-e218-9448fa01c9d4"
} | {
"account_age_days": 473,
"account_id": "ACCT-208C0C707803",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.594
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 298,
"timestamp": "2026-01-03T18:39:00Z",
"transaction_amount_usd": 8.47
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.397,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1815511.97,
"financial_exposure_usd": 3924079.07,
"recoverable_pct": 0.664
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102872",
"label": "fraudulent",
"label_confidence": 0.977,
"severity": "high",
"timestamp": "2026-01-02T23:52:00Z",
"trace_id": "df8dc86b-36ec-8fca-13ac-2a15a49434fb"
} | {
"account_age_days": 458,
"account_id": "ACCT-97FE3859014E",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_3",
"session_entropy": 0.67
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 1146,
"timestamp": "2026-01-02T23:52:00Z",
"transaction_amount_usd": 35095.3
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.819,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 498371.9,
"financial_exposure_usd": 689576.35,
"recoverable_pct": 0.275
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103320",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-03T07:20:00Z",
"trace_id": "3bbf9c80-561b-0c6d-0b82-0f8705b2aede"
} | {
"account_age_days": 613,
"account_id": "ACCT-FE06B6D7CA62",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_3",
"session_entropy": 0.944
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 198,
"timestamp": "2026-01-03T06:07:00Z",
"transaction_amount_usd": 21.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.637,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1235555.65,
"financial_exposure_usd": 1511813.69,
"recoverable_pct": 0.324
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102247",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-02T13:27:00Z",
"trace_id": "b4f6f35e-145e-dd54-31e6-0480cec56c59"
} | {
"account_age_days": 1636,
"account_id": "ACCT-CEFD3E0E04BA",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.649
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 552,
"timestamp": "2026-01-02T13:27:00Z",
"transaction_amount_usd": 100520.04
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.771,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 347410.06,
"financial_exposure_usd": 555577.32,
"recoverable_pct": 0.383
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101181",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "low",
"timestamp": "2026-01-01T19:41:00Z",
"trace_id": "54abbf9a-4cbf-946f-5204-eef66147c2e3"
} | {
"account_age_days": 478,
"account_id": "ACCT-5C24F19BCCE2",
"baseline_risk_score": 0.317,
"kyc_tier": "tier_3",
"session_entropy": 0.485
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 127,
"timestamp": "2026-01-01T19:41:00Z",
"transaction_amount_usd": 96599.29
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.922,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 531614.59,
"financial_exposure_usd": 976528.8,
"recoverable_pct": 0.345
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108813",
"label": "benign",
"label_confidence": 0.65,
"severity": "high",
"timestamp": "2026-01-07T02:53:00Z",
"trace_id": "d526496c-5ca2-396d-da04-e62eda0f0ea6"
} | {
"account_age_days": 596,
"account_id": "ACCT-F697706977AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.206
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 224,
"timestamp": "2026-01-07T02:53:00Z",
"transaction_amount_usd": 2603.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.67,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 629.51,
"financial_exposure_usd": 906.02,
"recoverable_pct": 0.733
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108507",
"label": "benign",
"label_confidence": 0.702,
"severity": "high",
"timestamp": "2026-01-06T21:47:00Z",
"trace_id": "55e8dfe9-ffdc-f668-b798-2b598b67f832"
} | {
"account_age_days": 1161,
"account_id": "ACCT-4AEFF765D5A3",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_3",
"session_entropy": 0.617
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1134,
"timestamp": "2026-01-06T21:47:00Z",
"transaction_amount_usd": 11033.68
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3702.23,
"financial_exposure_usd": 4484.52,
"recoverable_pct": 0.757
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102704",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-02T21:04:00Z",
"trace_id": "df6ce1ed-71e7-66dd-1920-dbe6c5865248"
} | {
"account_age_days": 997,
"account_id": "ACCT-A108FB3CD50C",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_1",
"session_entropy": 0.211
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 526,
"timestamp": "2026-01-02T21:04:00Z",
"transaction_amount_usd": 43040.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.482,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 248324.74,
"financial_exposure_usd": 344460.7,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109021",
"label": "benign",
"label_confidence": 0.616,
"severity": "high",
"timestamp": "2026-01-07T06:21:00Z",
"trace_id": "c0849453-a772-0168-645d-cfaa66beaa36"
} | {
"account_age_days": 1538,
"account_id": "ACCT-49559D597D87",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.287
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1118,
"timestamp": "2026-01-07T06:21:00Z",
"transaction_amount_usd": 11151.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2812.91,
"financial_exposure_usd": 4663.14,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102747",
"label": "fraudulent",
"label_confidence": 0.968,
"severity": "high",
"timestamp": "2026-01-02T21:47:00Z",
"trace_id": "4b049e2f-4aa7-57c8-02ce-c6649b863944"
} | {
"account_age_days": 1485,
"account_id": "ACCT-561A4DB2B321",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_2",
"session_entropy": 0.626
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 190,
"timestamp": "2026-01-02T21:47:00Z",
"transaction_amount_usd": 21200.01
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.577,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 409176.1,
"financial_exposure_usd": 660131.55,
"recoverable_pct": 0.651
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109989",
"label": "benign",
"label_confidence": 0.609,
"severity": "low",
"timestamp": "2026-01-07T22:29:00Z",
"trace_id": "22a8f7a0-82c1-41c9-a133-771029262f81"
} | {
"account_age_days": 1159,
"account_id": "ACCT-944E10375CD5",
"baseline_risk_score": 0.109,
"kyc_tier": "tier_3",
"session_entropy": 0.89
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1128,
"timestamp": "2026-01-07T22:29:00Z",
"transaction_amount_usd": 6598.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4416.28,
"financial_exposure_usd": 4540.61,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106806",
"label": "benign",
"label_confidence": 0.491,
"severity": "low",
"timestamp": "2026-01-05T17:26:00Z",
"trace_id": "a7122a6b-7e6c-754d-2535-bb98c4590002"
} | {
"account_age_days": 1131,
"account_id": "ACCT-882513576AF5",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1114,
"timestamp": "2026-01-05T17:26:00Z",
"transaction_amount_usd": 5700.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.668,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1239.09,
"financial_exposure_usd": 2934.5,
"recoverable_pct": 0.533
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109751",
"label": "benign",
"label_confidence": 0.602,
"severity": "low",
"timestamp": "2026-01-07T18:31:00Z",
"trace_id": "8b50b438-0a06-06a9-cd32-fae8bed8dea3"
} | {
"account_age_days": 465,
"account_id": "ACCT-1BF2AA42F24B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.9
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 110,
"timestamp": "2026-01-07T08:52:00Z",
"transaction_amount_usd": 8.01
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.471,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1403.03,
"financial_exposure_usd": 2165.43,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102833",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "high",
"timestamp": "2026-01-02T23:13:00Z",
"trace_id": "fbcfe1a1-cd33-a24a-a7a7-618f8779ca59"
} | {
"account_age_days": 1076,
"account_id": "ACCT-88752A147F81",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_3",
"session_entropy": 0.19
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 394,
"timestamp": "2026-01-02T17:07:00Z",
"transaction_amount_usd": 4.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.706,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 249349.94,
"financial_exposure_usd": 343244.54,
"recoverable_pct": 0.333
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100630",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "low",
"timestamp": "2026-01-01T10:30:00Z",
"trace_id": "be7e7841-ff32-6f49-ffb7-c38f725ad157"
} | {
"account_age_days": 518,
"account_id": "ACCT-413F294D698F",
"baseline_risk_score": 0.606,
"kyc_tier": "tier_3",
"session_entropy": 0.822
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 148,
"timestamp": "2026-01-01T10:30:00Z",
"transaction_amount_usd": 99012.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.581,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 212071.13,
"financial_exposure_usd": 367277.11,
"recoverable_pct": 0.823
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108383",
"label": "benign",
"label_confidence": 0.686,
"severity": "low",
"timestamp": "2026-01-06T19:43:00Z",
"trace_id": "a84460ab-76ca-a753-f2b1-aa6338f74463"
} | {
"account_age_days": 475,
"account_id": "ACCT-CE4B32AB264A",
"baseline_risk_score": 0.176,
"kyc_tier": "tier_2",
"session_entropy": 0.522
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 217,
"timestamp": "2026-01-06T15:21:00Z",
"transaction_amount_usd": 10.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.631,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5111.25,
"financial_exposure_usd": 6654.11,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102753",
"label": "fraudulent",
"label_confidence": 0.866,
"severity": "high",
"timestamp": "2026-01-02T21:53:00Z",
"trace_id": "4cc3b72f-110d-0bba-3700-8707537c2c98"
} | {
"account_age_days": 791,
"account_id": "ACCT-5D654F9619F8",
"baseline_risk_score": 0.593,
"kyc_tier": "tier_2",
"session_entropy": 0.148
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 856,
"timestamp": "2026-01-02T21:53:00Z",
"transaction_amount_usd": 99626.85
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.839,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 969606.64,
"financial_exposure_usd": 998784.45,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100414",
"label": "fraudulent",
"label_confidence": 0.795,
"severity": "critical",
"timestamp": "2026-01-01T06:54:00Z",
"trace_id": "60754bc1-1c50-6b06-dd87-a274f9169caf"
} | {
"account_age_days": 391,
"account_id": "ACCT-521B37301011",
"baseline_risk_score": 0.393,
"kyc_tier": "tier_1",
"session_entropy": 0.29
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 278,
"timestamp": "2026-01-01T06:54:00Z",
"transaction_amount_usd": 74689.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.528,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 433060.64,
"financial_exposure_usd": 651639.73,
"recoverable_pct": 0.075
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101538",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "medium",
"timestamp": "2026-01-02T01:38:00Z",
"trace_id": "989860cd-b165-1e4e-d1ba-5e76621e7e06"
} | {
"account_age_days": 1979,
"account_id": "ACCT-B01E707FD13F",
"baseline_risk_score": 0.608,
"kyc_tier": "tier_3",
"session_entropy": 0.749
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 821,
"timestamp": "2026-01-02T01:38:00Z",
"transaction_amount_usd": 32457.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.85,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 330505.37,
"financial_exposure_usd": 428902.03,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101362",
"label": "fraudulent",
"label_confidence": 0.767,
"severity": "high",
"timestamp": "2026-01-01T22:42:00Z",
"trace_id": "55ab9d52-9253-a30b-1a41-dd8d89595c12"
} | {
"account_age_days": 1349,
"account_id": "ACCT-B1F349B45B11",
"baseline_risk_score": 0.427,
"kyc_tier": "tier_1",
"session_entropy": 0.122
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 169,
"timestamp": "2026-01-01T22:42:00Z",
"transaction_amount_usd": 65185.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.815,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 589393.51,
"financial_exposure_usd": 962304.35,
"recoverable_pct": 0.269
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101589",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "medium",
"timestamp": "2026-01-02T02:29:00Z",
"trace_id": "eb29edfc-5d1d-eff6-ee11-be9fc7b8a59d"
} | {
"account_age_days": 148,
"account_id": "ACCT-60A836B1F387",
"baseline_risk_score": 0.466,
"kyc_tier": "tier_2",
"session_entropy": 0.538
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 706,
"timestamp": "2026-01-02T02:29:00Z",
"transaction_amount_usd": 57964.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.677,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 399941.36,
"financial_exposure_usd": 638124.87,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100263",
"label": "fraudulent",
"label_confidence": 0.979,
"severity": "high",
"timestamp": "2026-01-01T04:23:00Z",
"trace_id": "901b938f-b703-de19-d20f-65b31164d2e6"
} | {
"account_age_days": 1868,
"account_id": "ACCT-11269F9E03C0",
"baseline_risk_score": 0.615,
"kyc_tier": "tier_2",
"session_entropy": 0.705
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 214,
"timestamp": "2026-01-01T04:23:00Z",
"transaction_amount_usd": 69113.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.88,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 315568.09,
"financial_exposure_usd": 758970.92,
"recoverable_pct": 0.397
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106571",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "medium",
"timestamp": "2026-01-05T13:31:00Z",
"trace_id": "e814da86-3e49-02d1-6947-d51cc9315660"
} | {
"account_age_days": 1927,
"account_id": "ACCT-E0E365E74535",
"baseline_risk_score": 0.443,
"kyc_tier": "tier_1",
"session_entropy": 0.842
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 173,
"timestamp": "2026-01-05T13:31:00Z",
"transaction_amount_usd": 1756366.3
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.486,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5268331.6,
"financial_exposure_usd": 6845191.07,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107007",
"label": "benign",
"label_confidence": 0.718,
"severity": "medium",
"timestamp": "2026-01-05T20:47:00Z",
"trace_id": "15544407-8a70-268b-9c52-cf47b0d6cb50"
} | {
"account_age_days": 1214,
"account_id": "ACCT-1AE50BA6A965",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.713
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 112,
"timestamp": "2026-01-05T20:47:00Z",
"transaction_amount_usd": 13680.11
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.734,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2363.35,
"financial_exposure_usd": 2387.13,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102541",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "low",
"timestamp": "2026-01-02T18:21:00Z",
"trace_id": "0ec531af-4312-3246-3d19-5abc7172d473"
} | {
"account_age_days": 1940,
"account_id": "ACCT-F8F5F206403E",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_3",
"session_entropy": 0.706
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 270,
"timestamp": "2026-01-02T07:49:00Z",
"transaction_amount_usd": 8.59
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.671,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 785673.29,
"financial_exposure_usd": 838961.95,
"recoverable_pct": 0.044
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107664",
"label": "benign",
"label_confidence": 0.721,
"severity": "medium",
"timestamp": "2026-01-06T07:44:00Z",
"trace_id": "feb8c158-15d2-4f22-f057-d1b6f1f0da68"
} | {
"account_age_days": 1183,
"account_id": "ACCT-35FA036CE5D8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.737
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 878,
"timestamp": "2026-01-06T07:44:00Z",
"transaction_amount_usd": 6671.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1101.56,
"financial_exposure_usd": 1815.75,
"recoverable_pct": 1
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101850",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-02T06:50:00Z",
"trace_id": "a781af0d-bda3-4e0f-d5f4-d4149d103158"
} | {
"account_age_days": 1451,
"account_id": "ACCT-B26B2C00F4AD",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_3",
"session_entropy": 0.773
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 847,
"timestamp": "2026-01-02T06:50:00Z",
"transaction_amount_usd": 69682.99
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.711,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 755180.93,
"financial_exposure_usd": 1299322.76,
"recoverable_pct": 0.318
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102848",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "critical",
"timestamp": "2026-01-02T23:28:00Z",
"trace_id": "30f3bc87-8ffd-d887-f78c-6771a8de777f"
} | {
"account_age_days": 502,
"account_id": "ACCT-20CD3FF8DF83",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_3",
"session_entropy": 0.726
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 308,
"timestamp": "2026-01-02T11:59:00Z",
"transaction_amount_usd": 21.9
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.523,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 816559.41,
"financial_exposure_usd": 851482.96,
"recoverable_pct": 0.338
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109299",
"label": "benign",
"label_confidence": 0.476,
"severity": "low",
"timestamp": "2026-01-07T10:59:00Z",
"trace_id": "84aa78c7-b1b4-c44f-b73d-f8e2c42fcb46"
} | {
"account_age_days": 453,
"account_id": "ACCT-D5F5795CE0B1",
"baseline_risk_score": 0.126,
"kyc_tier": "tier_3",
"session_entropy": 0.212
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 297,
"timestamp": "2026-01-07T07:35:00Z",
"transaction_amount_usd": 12.12
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.768,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 96.21,
"financial_exposure_usd": 189.73,
"recoverable_pct": 0.966
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108539",
"label": "benign",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-06T22:19:00Z",
"trace_id": "40063e1c-9d7a-1e7a-477f-4ba73b14ceaf"
} | {
"account_age_days": 1265,
"account_id": "ACCT-7D26C17DAA8C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.779
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 228,
"timestamp": "2026-01-06T16:20:00Z",
"transaction_amount_usd": 3.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4377.21,
"financial_exposure_usd": 4389.94,
"recoverable_pct": 0.971
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104110",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "low",
"timestamp": "2026-01-03T20:30:00Z",
"trace_id": "e6d359a0-c44c-b9f8-a035-0d869144d427"
} | {
"account_age_days": 966,
"account_id": "ACCT-BBB6CA42A7D1",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_1",
"session_entropy": 0.188
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 111,
"timestamp": "2026-01-03T20:30:00Z",
"transaction_amount_usd": 143379.47
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.44,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 1385233.63,
"financial_exposure_usd": 2971030.2,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104699",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "medium",
"timestamp": "2026-01-04T06:19:00Z",
"trace_id": "804cde4c-b4a9-55e0-dba5-6332f1a884c5"
} | {
"account_age_days": 803,
"account_id": "ACCT-6F4DFC2416AC",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_2",
"session_entropy": 0.835
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 124,
"timestamp": "2026-01-04T06:19:00Z",
"transaction_amount_usd": 1213299.31
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2609232.37,
"financial_exposure_usd": 2620195.22,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107686",
"label": "benign",
"label_confidence": 0.505,
"severity": "high",
"timestamp": "2026-01-06T08:06:00Z",
"trace_id": "4e8c38ca-d074-de82-c40d-b68a3aa12192"
} | {
"account_age_days": 1324,
"account_id": "ACCT-25FB11C0DDE8",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_1",
"session_entropy": 0.585
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1014,
"timestamp": "2026-01-06T08:06:00Z",
"transaction_amount_usd": 347.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.67,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5016.65,
"financial_exposure_usd": 7148.21,
"recoverable_pct": 0.917
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104423",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "medium",
"timestamp": "2026-01-04T01:43:00Z",
"trace_id": "e95c7fa5-f783-e101-825c-579722d7bce4"
} | {
"account_age_days": 220,
"account_id": "ACCT-179E0365C4B0",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_3",
"session_entropy": 0.14
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 267,
"timestamp": "2026-01-03T19:35:00Z",
"transaction_amount_usd": 8.96
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.905,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2772085.69,
"financial_exposure_usd": 3127234.11,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107299",
"label": "benign",
"label_confidence": 0.467,
"severity": "high",
"timestamp": "2026-01-06T01:39:00Z",
"trace_id": "e5c43d26-cc4a-f992-2524-0f06f7642348"
} | {
"account_age_days": 1935,
"account_id": "ACCT-22F8A3878B07",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.577
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 98,
"timestamp": "2026-01-05T23:07:00Z",
"transaction_amount_usd": 20.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.562,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5788.99,
"financial_exposure_usd": 6493.05,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104215",
"label": "fraudulent",
"label_confidence": 0.726,
"severity": "medium",
"timestamp": "2026-01-03T22:15:00Z",
"trace_id": "b450a651-baf7-b0e7-0f31-ffd3b9c4b21a"
} | {
"account_age_days": 260,
"account_id": "ACCT-879FE82A80E9",
"baseline_risk_score": 0.112,
"kyc_tier": "tier_2",
"session_entropy": 0.776
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 268,
"timestamp": "2026-01-03T13:24:00Z",
"transaction_amount_usd": 5.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.455,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5024920.87,
"financial_exposure_usd": 6243823.59,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108341",
"label": "benign",
"label_confidence": 0.575,
"severity": "medium",
"timestamp": "2026-01-06T19:01:00Z",
"trace_id": "31e29aee-99f2-ea66-8000-f28ab8992573"
} | {
"account_age_days": 1494,
"account_id": "ACCT-21CBCEE5FB2C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.186
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 979,
"timestamp": "2026-01-06T19:01:00Z",
"transaction_amount_usd": 7363.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3709.53,
"financial_exposure_usd": 5020.57,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103941",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-03T17:41:00Z",
"trace_id": "aa381500-65bf-c232-d4a1-db6ca37913d2"
} | {
"account_age_days": 1311,
"account_id": "ACCT-7ADC85EF8094",
"baseline_risk_score": 0.245,
"kyc_tier": "tier_3",
"session_entropy": 0.204
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 190,
"timestamp": "2026-01-03T13:26:00Z",
"transaction_amount_usd": 11.27
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.42,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 961172.52,
"financial_exposure_usd": 2146503.15,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109041",
"label": "benign",
"label_confidence": 0.739,
"severity": "high",
"timestamp": "2026-01-07T06:41:00Z",
"trace_id": "12309e7e-292c-e93c-39bc-5178f3d10951"
} | {
"account_age_days": 1091,
"account_id": "ACCT-9D738EC576A5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.785
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 309,
"timestamp": "2026-01-07T03:40:00Z",
"transaction_amount_usd": 13.34
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.79,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 1131.06,
"financial_exposure_usd": 1940.28,
"recoverable_pct": 0.842
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100268",
"label": "fraudulent",
"label_confidence": 0.972,
"severity": "medium",
"timestamp": "2026-01-01T04:28:00Z",
"trace_id": "ce972144-4d17-094c-9288-cbf5a6bd63a4"
} | {
"account_age_days": 1424,
"account_id": "ACCT-F6DE974A6D9D",
"baseline_risk_score": 0.368,
"kyc_tier": "tier_3",
"session_entropy": 0.849
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 220,
"timestamp": "2026-01-01T01:10:00Z",
"transaction_amount_usd": 23.01
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.536,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 587476.41,
"financial_exposure_usd": 684476.8,
"recoverable_pct": 0.521
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104706",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "critical",
"timestamp": "2026-01-04T06:26:00Z",
"trace_id": "67285727-2f85-6c8e-921d-e0734189b4de"
} | {
"account_age_days": 921,
"account_id": "ACCT-B8631BEBA09E",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_1",
"session_entropy": 0.65
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 931,
"timestamp": "2026-01-04T06:26:00Z",
"transaction_amount_usd": 1603507.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.363,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5354343.31,
"financial_exposure_usd": 5973214.72,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101321",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "high",
"timestamp": "2026-01-01T22:01:00Z",
"trace_id": "bed3c3da-8b1d-3dd5-8fba-eca836fc43f4"
} | {
"account_age_days": 1381,
"account_id": "ACCT-F120040B43AF",
"baseline_risk_score": 0.358,
"kyc_tier": "tier_2",
"session_entropy": 0.252
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 362,
"timestamp": "2026-01-01T22:01:00Z",
"transaction_amount_usd": 30409.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.453,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 581838.46,
"financial_exposure_usd": 988854.21,
"recoverable_pct": 0.159
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103687",
"label": "fraudulent",
"label_confidence": 0.897,
"severity": "high",
"timestamp": "2026-01-03T13:27:00Z",
"trace_id": "f29aff1d-e885-8742-d2f7-af8ec8b17006"
} | {
"account_age_days": 1145,
"account_id": "ACCT-E01C13D6B2DD",
"baseline_risk_score": 0.228,
"kyc_tier": "tier_2",
"session_entropy": 0.24
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 942,
"timestamp": "2026-01-03T13:27:00Z",
"transaction_amount_usd": 701414.6
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.828,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2763521.16,
"financial_exposure_usd": 6645853.28,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108091",
"label": "benign",
"label_confidence": 0.472,
"severity": "medium",
"timestamp": "2026-01-06T14:51:00Z",
"trace_id": "eea93668-d95e-f61b-76cb-a2bcc469582e"
} | {
"account_age_days": 456,
"account_id": "ACCT-6D58B013F8C4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.33
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1133,
"timestamp": "2026-01-06T14:51:00Z",
"transaction_amount_usd": 7517.5
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.76,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2816.45,
"financial_exposure_usd": 4643.75,
"recoverable_pct": 0.478
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102201",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "low",
"timestamp": "2026-01-02T12:41:00Z",
"trace_id": "03cb4736-d99f-e6a4-f890-9b87ce98b55c"
} | {
"account_age_days": 354,
"account_id": "ACCT-818A7C08B2D4",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_3",
"session_entropy": 0.334
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 177,
"timestamp": "2026-01-02T03:56:00Z",
"transaction_amount_usd": 25
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.828,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 273577.07,
"financial_exposure_usd": 281849.33,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102195",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "high",
"timestamp": "2026-01-02T12:35:00Z",
"trace_id": "a72c767c-9439-6e8e-5a7c-64f71bcc091d"
} | {
"account_age_days": 835,
"account_id": "ACCT-B395DCD2F391",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_1",
"session_entropy": 0.822
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 876,
"timestamp": "2026-01-02T12:35:00Z",
"transaction_amount_usd": 95869.09
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.573,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 615959.67,
"financial_exposure_usd": 705807.22,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109531",
"label": "benign",
"label_confidence": 0.465,
"severity": "medium",
"timestamp": "2026-01-07T14:51:00Z",
"trace_id": "f5253e43-cc46-7fc4-7e9b-4f0906ba6773"
} | {
"account_age_days": 421,
"account_id": "ACCT-969D223880CD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.66
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 205,
"timestamp": "2026-01-07T10:28:00Z",
"transaction_amount_usd": 1.11
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.454,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1299.15,
"financial_exposure_usd": 1408.64,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108077",
"label": "benign",
"label_confidence": 0.572,
"severity": "medium",
"timestamp": "2026-01-06T14:37:00Z",
"trace_id": "a4302207-d9bd-e1c9-fd5d-16e384798eee"
} | {
"account_age_days": 1948,
"account_id": "ACCT-7C404D1EB565",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.66
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 881,
"timestamp": "2026-01-06T14:37:00Z",
"transaction_amount_usd": 13465.49
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1455.19,
"financial_exposure_usd": 1755.38,
"recoverable_pct": 0.737
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103061",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "critical",
"timestamp": "2026-01-03T03:01:00Z",
"trace_id": "fee48d5d-f011-42a6-d0bb-f0f15b8641fe"
} | {
"account_age_days": 1489,
"account_id": "ACCT-315EC5BC4F77",
"baseline_risk_score": 0.638,
"kyc_tier": "tier_3",
"session_entropy": 0.187
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 209,
"timestamp": "2026-01-02T16:17:00Z",
"transaction_amount_usd": 1.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.699,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 9",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 698936.01,
"financial_exposure_usd": 842472.58,
"recoverable_pct": 0.588
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107300",
"label": "benign",
"label_confidence": 0.498,
"severity": "low",
"timestamp": "2026-01-06T01:40:00Z",
"trace_id": "9705051d-8bdc-e92b-d39e-ff33a3f73718"
} | {
"account_age_days": 1389,
"account_id": "ACCT-A51A6D712BF7",
"baseline_risk_score": 0.19,
"kyc_tier": "tier_1",
"session_entropy": 0.186
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 917,
"timestamp": "2026-01-06T01:40:00Z",
"transaction_amount_usd": 3186.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1254.48,
"financial_exposure_usd": 1470.33,
"recoverable_pct": 0.615
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108712",
"label": "benign",
"label_confidence": 0.747,
"severity": "high",
"timestamp": "2026-01-07T01:12:00Z",
"trace_id": "fc62e53c-fd42-19a2-42a4-47e12dd41834"
} | {
"account_age_days": 625,
"account_id": "ACCT-ED0BEA31FB22",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.3
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 479,
"timestamp": "2026-01-07T01:12:00Z",
"transaction_amount_usd": 13313.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.634,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 304.3,
"financial_exposure_usd": 538.18,
"recoverable_pct": 0.579
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108625",
"label": "benign",
"label_confidence": 0.51,
"severity": "high",
"timestamp": "2026-01-06T23:45:00Z",
"trace_id": "d93836c6-4ec4-12f9-32f8-d954ba159eaf"
} | {
"account_age_days": 1045,
"account_id": "ACCT-F69E6067F8BB",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_2",
"session_entropy": 0.144
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1085,
"timestamp": "2026-01-06T23:45:00Z",
"transaction_amount_usd": 5932.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.495,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.694
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107263",
"label": "benign",
"label_confidence": 0.644,
"severity": "low",
"timestamp": "2026-01-06T01:03:00Z",
"trace_id": "09830ece-eb11-f758-5eb4-e0217d2c0b7a"
} | {
"account_age_days": 1134,
"account_id": "ACCT-9CD5CAA4578A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.245
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 539,
"timestamp": "2026-01-06T01:03:00Z",
"transaction_amount_usd": 11863.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.674,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3168.33,
"financial_exposure_usd": 5870.24,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102606",
"label": "fraudulent",
"label_confidence": 0.963,
"severity": "high",
"timestamp": "2026-01-02T19:26:00Z",
"trace_id": "a6e7d54a-e773-7504-0640-bca92cc28aa9"
} | {
"account_age_days": 309,
"account_id": "ACCT-E6A17CCB045F",
"baseline_risk_score": 0.528,
"kyc_tier": "tier_1",
"session_entropy": 0.732
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 169,
"timestamp": "2026-01-02T12:18:00Z",
"transaction_amount_usd": 21.77
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.703,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 490951.01,
"financial_exposure_usd": 796306.9,
"recoverable_pct": 0.077
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108532",
"label": "benign",
"label_confidence": 0.64,
"severity": "medium",
"timestamp": "2026-01-06T22:12:00Z",
"trace_id": "4bf0b0e7-2102-bd67-fd20-085887cc147b"
} | {
"account_age_days": 714,
"account_id": "ACCT-0F003E0A0A47",
"baseline_risk_score": 0.103,
"kyc_tier": "tier_2",
"session_entropy": 0.785
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 457,
"timestamp": "2026-01-06T22:12:00Z",
"transaction_amount_usd": 2713.03
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.629,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3162.09,
"financial_exposure_usd": 5492.19,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102636",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "critical",
"timestamp": "2026-01-02T19:56:00Z",
"trace_id": "355fccb9-3ce9-38a8-3b55-081951c7a01d"
} | {
"account_age_days": 473,
"account_id": "ACCT-F3B9F0B04CD2",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_2",
"session_entropy": 0.149
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 148,
"timestamp": "2026-01-02T15:23:00Z",
"transaction_amount_usd": 22.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1071749.12,
"financial_exposure_usd": 1459157.56,
"recoverable_pct": 0.193
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104835",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "high",
"timestamp": "2026-01-04T08:35:00Z",
"trace_id": "649f364f-929f-1d3c-b8b3-db81b2cc164a"
} | {
"account_age_days": 1644,
"account_id": "ACCT-B6BEC9B9DBB0",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_3",
"session_entropy": 0.624
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 179,
"timestamp": "2026-01-04T00:29:00Z",
"transaction_amount_usd": 4.06
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.479,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6320395.4,
"financial_exposure_usd": 7933519.2,
"recoverable_pct": 0.803
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107849",
"label": "benign",
"label_confidence": 0.496,
"severity": "medium",
"timestamp": "2026-01-06T10:49:00Z",
"trace_id": "22cc0d73-04ed-66d8-b22a-9b7c46a0c6a2"
} | {
"account_age_days": 819,
"account_id": "ACCT-223125576794",
"baseline_risk_score": 0.171,
"kyc_tier": "tier_2",
"session_entropy": 0.168
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 805,
"timestamp": "2026-01-06T10:49:00Z",
"transaction_amount_usd": 11452.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 0, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101748",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "critical",
"timestamp": "2026-01-02T05:08:00Z",
"trace_id": "ef72b9cc-15a2-61c5-115d-c8c9bd0e8105"
} | {
"account_age_days": 523,
"account_id": "ACCT-481FE2F92218",
"baseline_risk_score": 0.254,
"kyc_tier": "tier_1",
"session_entropy": 0.493
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 84,
"timestamp": "2026-01-02T00:29:00Z",
"transaction_amount_usd": 17.72
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 162645.55,
"financial_exposure_usd": 300666.14,
"recoverable_pct": 0.318
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108051",
"label": "benign",
"label_confidence": 0.536,
"severity": "low",
"timestamp": "2026-01-06T14:11:00Z",
"trace_id": "f24c14a8-81b3-5c59-898b-676fb8f7d33d"
} | {
"account_age_days": 605,
"account_id": "ACCT-72BBFB2BF429",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.388
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 355,
"timestamp": "2026-01-06T07:44:00Z",
"transaction_amount_usd": 2.45
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1389.69,
"financial_exposure_usd": 2350.75,
"recoverable_pct": 0.441
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109259",
"label": "benign",
"label_confidence": 0.721,
"severity": "low",
"timestamp": "2026-01-07T10:19:00Z",
"trace_id": "538393fa-d82d-a3fb-e792-cef17037b7c4"
} | {
"account_age_days": 177,
"account_id": "ACCT-DDB09FBA85CA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.732
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 889,
"timestamp": "2026-01-07T10:19:00Z",
"transaction_amount_usd": 14469.79
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4032.86,
"financial_exposure_usd": 6337.6,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106816",
"label": "benign",
"label_confidence": 0.552,
"severity": "low",
"timestamp": "2026-01-05T17:36:00Z",
"trace_id": "01b66abe-f3f3-b53b-98f1-f7e62d7a1057"
} | {
"account_age_days": 1697,
"account_id": "ACCT-FFC6DAD1C5CC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.571
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 284,
"timestamp": "2026-01-05T17:36:00Z",
"transaction_amount_usd": 7644.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 765.9,
"financial_exposure_usd": 1296.95,
"recoverable_pct": 0.955
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106447",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "medium",
"timestamp": "2026-01-05T11:27:00Z",
"trace_id": "45d2b1cd-6d81-051a-791c-d3a5938de450"
} | {
"account_age_days": 715,
"account_id": "ACCT-C48E6D618758",
"baseline_risk_score": 0.318,
"kyc_tier": "tier_2",
"session_entropy": 0.353
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 279,
"timestamp": "2026-01-05T11:27:00Z",
"transaction_amount_usd": 81300.57
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.373,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2114408.49,
"financial_exposure_usd": 4046511.19,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104516",
"label": "fraudulent",
"label_confidence": 0.836,
"severity": "high",
"timestamp": "2026-01-04T03:16:00Z",
"trace_id": "64cc42f6-cb24-2911-b8b2-62ed85e22561"
} | {
"account_age_days": 185,
"account_id": "ACCT-399D74577F92",
"baseline_risk_score": 0.267,
"kyc_tier": "tier_1",
"session_entropy": 0.277
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 177,
"timestamp": "2026-01-03T20:32:00Z",
"transaction_amount_usd": 22.61
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.75,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 10177790.93,
"financial_exposure_usd": 10248033.84,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108249",
"label": "benign",
"label_confidence": 0.502,
"severity": "low",
"timestamp": "2026-01-06T17:29:00Z",
"trace_id": "274a37f0-fcca-81c0-01ab-13373db1bd5d"
} | {
"account_age_days": 973,
"account_id": "ACCT-2869C7705E21",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.24
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 217,
"timestamp": "2026-01-06T07:51:00Z",
"transaction_amount_usd": 19.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3597.68,
"financial_exposure_usd": 8454.7,
"recoverable_pct": 0.972
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108768",
"label": "benign",
"label_confidence": 0.554,
"severity": "low",
"timestamp": "2026-01-07T02:08:00Z",
"trace_id": "65229ea9-55ca-2252-b834-bb6501af7c43"
} | {
"account_age_days": 1403,
"account_id": "ACCT-7A91D71DD1C4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.314
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 217,
"timestamp": "2026-01-06T14:45:00Z",
"transaction_amount_usd": 9.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.669,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3575.08,
"financial_exposure_usd": 3984.47,
"recoverable_pct": 0.755
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100535",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "low",
"timestamp": "2026-01-01T08:55:00Z",
"trace_id": "6111fe2d-071b-cd2a-2333-c422a3dc2212"
} | {
"account_age_days": 67,
"account_id": "ACCT-A82B29EEDA23",
"baseline_risk_score": 0.293,
"kyc_tier": "tier_1",
"session_entropy": 0.364
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 147,
"timestamp": "2026-01-01T08:55:00Z",
"transaction_amount_usd": 30117.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.43,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 560793.65,
"financial_exposure_usd": 764965.89,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107989",
"label": "benign",
"label_confidence": 0.58,
"severity": "medium",
"timestamp": "2026-01-06T13:09:00Z",
"trace_id": "985ead5b-b53b-e994-850d-4357a7b83634"
} | {
"account_age_days": 1602,
"account_id": "ACCT-9F9661C7FFC7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.271
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 288,
"timestamp": "2026-01-06T13:09:00Z",
"transaction_amount_usd": 5389.26
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.615,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1772.28,
"financial_exposure_usd": 3931.84,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108479",
"label": "benign",
"label_confidence": 0.516,
"severity": "low",
"timestamp": "2026-01-06T21:19:00Z",
"trace_id": "f1b7d27c-cee0-25cb-bf2f-cfae90b4b816"
} | {
"account_age_days": 1408,
"account_id": "ACCT-0DCF1A2557F7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.234
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 149,
"timestamp": "2026-01-06T21:19:00Z",
"transaction_amount_usd": 8773.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.531,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1261.98,
"financial_exposure_usd": 2768.79,
"recoverable_pct": 0.648
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108781",
"label": "benign",
"label_confidence": 0.618,
"severity": "low",
"timestamp": "2026-01-07T02:21:00Z",
"trace_id": "ca0e72e9-358c-1f48-c7e1-56ba4d6ba7a7"
} | {
"account_age_days": 767,
"account_id": "ACCT-0F5180CB50AF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.614
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 886,
"timestamp": "2026-01-07T02:21:00Z",
"transaction_amount_usd": 5738.14
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.541,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2685.85,
"financial_exposure_usd": 3900.89,
"recoverable_pct": 0.517
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103776",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-03T14:56:00Z",
"trace_id": "54a36217-3d14-c5dd-810f-84be4aa6603e"
} | {
"account_age_days": 841,
"account_id": "ACCT-470BEBFBFADA",
"baseline_risk_score": 0.208,
"kyc_tier": "tier_3",
"session_entropy": 0.376
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 622,
"timestamp": "2026-01-03T14:56:00Z",
"transaction_amount_usd": 1533924.31
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.657,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2208633.04,
"financial_exposure_usd": 3364838.18,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105312",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-04T16:32:00Z",
"trace_id": "d656ec59-1cde-d583-4abc-0d7c4a9b6ba8"
} | {
"account_age_days": 1983,
"account_id": "ACCT-E28F51BC61E7",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_2",
"session_entropy": 0.258
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 504,
"timestamp": "2026-01-04T16:32:00Z",
"transaction_amount_usd": 1609131.71
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.899,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3945663.92,
"financial_exposure_usd": 4258935.03,
"recoverable_pct": 0.872
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100306",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-01T05:06:00Z",
"trace_id": "37280c98-3c64-b7e5-54ef-e0540206ad9d"
} | {
"account_age_days": 1137,
"account_id": "ACCT-B65D95C2522C",
"baseline_risk_score": 0.468,
"kyc_tier": "tier_2",
"session_entropy": 0.674
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 1063,
"timestamp": "2026-01-01T05:06:00Z",
"transaction_amount_usd": 35739.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 625018.22,
"financial_exposure_usd": 1244593.31,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108436",
"label": "benign",
"label_confidence": 0.525,
"severity": "medium",
"timestamp": "2026-01-06T20:36:00Z",
"trace_id": "c2fae27c-53ad-769e-1411-b0e8c6ac4c05"
} | {
"account_age_days": 1978,
"account_id": "ACCT-69B8BB460A43",
"baseline_risk_score": 0.165,
"kyc_tier": "tier_1",
"session_entropy": 0.941
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1200,
"timestamp": "2026-01-06T20:36:00Z",
"transaction_amount_usd": 4634.02
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 161.77,
"financial_exposure_usd": 387.54,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108003",
"label": "benign",
"label_confidence": 0.51,
"severity": "medium",
"timestamp": "2026-01-06T13:23:00Z",
"trace_id": "e8087ab4-f950-eccd-3bc3-a5ce0aa10c71"
} | {
"account_age_days": 1985,
"account_id": "ACCT-A0C999E919AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.781
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 479,
"timestamp": "2026-01-06T13:23:00Z",
"transaction_amount_usd": 166.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3166.03,
"financial_exposure_usd": 5886.93,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104270",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "medium",
"timestamp": "2026-01-03T23:10:00Z",
"trace_id": "e4803666-6e5c-0b86-09cc-0b56f32c2c22"
} | {
"account_age_days": 642,
"account_id": "ACCT-CEEB547282F6",
"baseline_risk_score": 0.116,
"kyc_tier": "tier_2",
"session_entropy": 0.318
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 982,
"timestamp": "2026-01-03T23:10:00Z",
"transaction_amount_usd": 1485533.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.399,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2739654.76,
"financial_exposure_usd": 4383235.11,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108990",
"label": "benign",
"label_confidence": 0.595,
"severity": "medium",
"timestamp": "2026-01-07T05:50:00Z",
"trace_id": "1381f20a-07d0-2b30-125b-fd1494707262"
} | {
"account_age_days": 1346,
"account_id": "ACCT-6A7DE5CC525E",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.58
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 274,
"timestamp": "2026-01-07T05:50:00Z",
"transaction_amount_usd": 5837.8
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 2235.17,
"financial_exposure_usd": 3788.1,
"recoverable_pct": 0.412
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106669",
"label": "benign",
"label_confidence": 0.534,
"severity": "low",
"timestamp": "2026-01-05T15:09:00Z",
"trace_id": "9ffac35b-8894-fc77-1719-81695451ee68"
} | {
"account_age_days": 937,
"account_id": "ACCT-F1B57E8BA62C",
"baseline_risk_score": 0.108,
"kyc_tier": "tier_2",
"session_entropy": 0.71
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1133,
"timestamp": "2026-01-05T15:09:00Z",
"transaction_amount_usd": 277.62
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 877.48,
"financial_exposure_usd": 955.56,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109663",
"label": "benign",
"label_confidence": 0.62,
"severity": "low",
"timestamp": "2026-01-07T17:03:00Z",
"trace_id": "6b9dd07b-6b29-b65a-959f-06fbf21355bf"
} | {
"account_age_days": 452,
"account_id": "ACCT-D5CA77FFE1FF",
"baseline_risk_score": 0.062,
"kyc_tier": "tier_2",
"session_entropy": 0.564
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 283,
"timestamp": "2026-01-07T11:01:00Z",
"transaction_amount_usd": 12.45
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.604,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 750.02,
"financial_exposure_usd": 1150.53,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106918",
"label": "benign",
"label_confidence": 0.54,
"severity": "high",
"timestamp": "2026-01-05T19:18:00Z",
"trace_id": "091f1284-0300-146d-86d6-fbcdd60c4dc2"
} | {
"account_age_days": 1836,
"account_id": "ACCT-4F8FD8712B3A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.104
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 274,
"timestamp": "2026-01-05T07:00:00Z",
"transaction_amount_usd": 14.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.648,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 924.3,
"financial_exposure_usd": 1471.39,
"recoverable_pct": 0.569
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100738",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "critical",
"timestamp": "2026-01-01T12:18:00Z",
"trace_id": "0abe1622-67e3-a63b-9222-51b8e78e59a6"
} | {
"account_age_days": 1236,
"account_id": "ACCT-775C070FD48E",
"baseline_risk_score": 0.289,
"kyc_tier": "tier_2",
"session_entropy": 0.368
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 222,
"timestamp": "2026-01-01T03:30:00Z",
"transaction_amount_usd": 23.85
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 740779.9,
"financial_exposure_usd": 792833.94,
"recoverable_pct": 0.347
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109281",
"label": "benign",
"label_confidence": 0.561,
"severity": "high",
"timestamp": "2026-01-07T10:41:00Z",
"trace_id": "de081d4a-628d-0f54-5502-9f9cc2114397"
} | {
"account_age_days": 966,
"account_id": "ACCT-8029032FD23D",
"baseline_risk_score": 0.105,
"kyc_tier": "tier_2",
"session_entropy": 0.481
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 388,
"timestamp": "2026-01-07T10:41:00Z",
"transaction_amount_usd": 4725.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3156.78,
"financial_exposure_usd": 5307.78,
"recoverable_pct": 0.811
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109517",
"label": "benign",
"label_confidence": 0.54,
"severity": "high",
"timestamp": "2026-01-07T14:37:00Z",
"trace_id": "e290ac6b-7bd9-c2c7-b79b-19c62a8e99f7"
} | {
"account_age_days": 1712,
"account_id": "ACCT-74054829D1C8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.317
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1070,
"timestamp": "2026-01-07T14:37:00Z",
"transaction_amount_usd": 3516.97
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.766,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3930.9,
"financial_exposure_usd": 4917.64,
"recoverable_pct": 0.583
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105444",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "medium",
"timestamp": "2026-01-04T18:44:00Z",
"trace_id": "b645c0fe-bdde-1c0e-6d9d-cfa20f6b7d80"
} | {
"account_age_days": 50,
"account_id": "ACCT-D0FE3A493994",
"baseline_risk_score": 0.206,
"kyc_tier": "tier_1",
"session_entropy": 0.939
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 335,
"timestamp": "2026-01-04T18:44:00Z",
"transaction_amount_usd": 1723137
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.806,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5171323.09,
"financial_exposure_usd": 5643928.1,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107481",
"label": "benign",
"label_confidence": 0.719,
"severity": "medium",
"timestamp": "2026-01-06T04:41:00Z",
"trace_id": "17d39283-bfd6-7c49-0f78-3787bbe59cb1"
} | {
"account_age_days": 1522,
"account_id": "ACCT-D1903A56F6A1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.219
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 575,
"timestamp": "2026-01-06T04:41:00Z",
"transaction_amount_usd": 2618.07
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2011.87,
"financial_exposure_usd": 2544.45,
"recoverable_pct": 0.682
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109003",
"label": "benign",
"label_confidence": 0.486,
"severity": "medium",
"timestamp": "2026-01-07T06:03:00Z",
"trace_id": "7b445460-7805-d48f-e7c8-170078466971"
} | {
"account_age_days": 1838,
"account_id": "ACCT-3E1B878A316E",
"baseline_risk_score": 0.169,
"kyc_tier": "tier_3",
"session_entropy": 0.62
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 268,
"timestamp": "2026-01-07T00:03:00Z",
"transaction_amount_usd": 9.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.687,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1757.72,
"financial_exposure_usd": 1997.75,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109055",
"label": "benign",
"label_confidence": 0.661,
"severity": "high",
"timestamp": "2026-01-07T06:55:00Z",
"trace_id": "668aad29-3b37-f980-85ec-59782cde7866"
} | {
"account_age_days": 11,
"account_id": "ACCT-FC7976DF5BDD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.864
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1126,
"timestamp": "2026-01-07T06:55:00Z",
"transaction_amount_usd": 2473.9
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.502,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2008.21,
"financial_exposure_usd": 3573.99,
"recoverable_pct": 0.792
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101390",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-01T23:10:00Z",
"trace_id": "b83b087c-a59f-4695-3dbe-41a50a2721dd"
} | {
"account_age_days": 902,
"account_id": "ACCT-D7BEEC4F7A01",
"baseline_risk_score": 0.328,
"kyc_tier": "tier_3",
"session_entropy": 0.863
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 607,
"timestamp": "2026-01-01T23:10:00Z",
"transaction_amount_usd": 74520.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 406379.29,
"financial_exposure_usd": 473735.75,
"recoverable_pct": 0.081
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100007",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "critical",
"timestamp": "2026-01-01T00:07:00Z",
"trace_id": "0cdb1ca4-76ec-bdd6-8498-e113b227462c"
} | {
"account_age_days": 454,
"account_id": "ACCT-CCC429038BCF",
"baseline_risk_score": 0.631,
"kyc_tier": "tier_2",
"session_entropy": 0.613
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 366,
"timestamp": "2025-12-31T13:56:00Z",
"transaction_amount_usd": 11.62
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.514,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 263977.26,
"financial_exposure_usd": 632409.78,
"recoverable_pct": 0.286
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106668",
"label": "benign",
"label_confidence": 0.487,
"severity": "low",
"timestamp": "2026-01-05T15:08:00Z",
"trace_id": "b67f77bd-be14-a86c-91aa-931d2440e0c7"
} | {
"account_age_days": 366,
"account_id": "ACCT-5D7D802E03CF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.259
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 668,
"timestamp": "2026-01-05T15:08:00Z",
"transaction_amount_usd": 4088.25
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.69,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 892.54,
"financial_exposure_usd": 1442.59,
"recoverable_pct": 0.715
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106661",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-05T15:01:00Z",
"trace_id": "b5ed7021-851c-1f26-d358-6a9f869ab8a1"
} | {
"account_age_days": 1112,
"account_id": "ACCT-80C103D8529E",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_2",
"session_entropy": 0.197
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 290,
"timestamp": "2026-01-05T05:16:00Z",
"transaction_amount_usd": 2.95
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.665,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3749249.38,
"financial_exposure_usd": 8049168.67,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103916",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "critical",
"timestamp": "2026-01-03T17:16:00Z",
"trace_id": "3af1e009-bf5a-499e-0b21-b8109187c8eb"
} | {
"account_age_days": 364,
"account_id": "ACCT-D4169676E423",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.293
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 448,
"timestamp": "2026-01-03T17:16:00Z",
"transaction_amount_usd": 2223272.99
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4653007.56,
"financial_exposure_usd": 5112785.51,
"recoverable_pct": 0.746
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104614",
"label": "fraudulent",
"label_confidence": 0.904,
"severity": "medium",
"timestamp": "2026-01-04T04:54:00Z",
"trace_id": "c227a91d-3a26-c6f5-43bd-dfdab740e619"
} | {
"account_age_days": 580,
"account_id": "ACCT-F678174221B8",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_3",
"session_entropy": 0.825
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1112,
"timestamp": "2026-01-04T04:54:00Z",
"transaction_amount_usd": 2811850.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.671,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2843545.63,
"financial_exposure_usd": 4476228.42,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107575",
"label": "benign",
"label_confidence": 0.728,
"severity": "high",
"timestamp": "2026-01-06T06:15:00Z",
"trace_id": "530cc07c-792a-772d-681d-dcd98dda8185"
} | {
"account_age_days": 703,
"account_id": "ACCT-230AAF3C2CF4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.84
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 715,
"timestamp": "2026-01-06T06:15:00Z",
"transaction_amount_usd": 1767.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.501,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 110.84,
"financial_exposure_usd": 152.8,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102731",
"label": "fraudulent",
"label_confidence": 0.98,
"severity": "low",
"timestamp": "2026-01-02T21:31:00Z",
"trace_id": "472be899-f2ea-02e3-f09b-3783335c3aff"
} | {
"account_age_days": 1155,
"account_id": "ACCT-A0001E49493A",
"baseline_risk_score": 0.452,
"kyc_tier": "tier_1",
"session_entropy": 0.373
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 246,
"timestamp": "2026-01-02T12:15:00Z",
"transaction_amount_usd": 10.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.63,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 673272.76,
"financial_exposure_usd": 1007828.15,
"recoverable_pct": 0.181
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.