schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103767",
"label": "fraudulent",
"label_confidence": 0.707,
"severity": "high",
"timestamp": "2026-01-03T14:47:00Z",
"trace_id": "5d202453-d622-5ac3-d680-5c86ca68cd62"
} | {
"account_age_days": 698,
"account_id": "ACCT-76ACD0354245",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_3",
"session_entropy": 0.884
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 438,
"timestamp": "2026-01-03T14:47:00Z",
"transaction_amount_usd": 1524072.4
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.491,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 0, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109363",
"label": "benign",
"label_confidence": 0.638,
"severity": "critical",
"timestamp": "2026-01-07T12:03:00Z",
"trace_id": "c02edf0f-0733-7a1b-b629-5025b6cc8674"
} | {
"account_age_days": 832,
"account_id": "ACCT-1C4B4008A6B8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.379
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 370,
"timestamp": "2026-01-07T02:41:00Z",
"transaction_amount_usd": 10.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.528,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3833.21,
"financial_exposure_usd": 4820.13,
"recoverable_pct": 0.957
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101163",
"label": "fraudulent",
"label_confidence": 0.77,
"severity": "high",
"timestamp": "2026-01-01T19:23:00Z",
"trace_id": "50179a7d-b1ea-2e35-b137-d9fc355af95b"
} | {
"account_age_days": 1900,
"account_id": "ACCT-7DFD523D4318",
"baseline_risk_score": 0.312,
"kyc_tier": "tier_2",
"session_entropy": 0.715
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 183,
"timestamp": "2026-01-01T19:23:00Z",
"transaction_amount_usd": 13090.08
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.71,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 532688.29,
"financial_exposure_usd": 1057347.64,
"recoverable_pct": 0.252
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107725",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-06T08:45:00Z",
"trace_id": "2bc1cbf9-0531-1e77-fc09-bbe3533cec7b"
} | {
"account_age_days": 1488,
"account_id": "ACCT-9C13054DAC0F",
"baseline_risk_score": 0.125,
"kyc_tier": "tier_2",
"session_entropy": 0.831
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 270,
"timestamp": "2026-01-05T20:46:00Z",
"transaction_amount_usd": 17.69
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 442.7,
"financial_exposure_usd": 744.12,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106330",
"label": "fraudulent",
"label_confidence": 0.605,
"severity": "high",
"timestamp": "2026-01-05T09:30:00Z",
"trace_id": "bac98cb9-661c-5e38-9ee7-34a18a644c98"
} | {
"account_age_days": 949,
"account_id": "ACCT-493B330168B2",
"baseline_risk_score": 0.412,
"kyc_tier": "tier_3",
"session_entropy": 0.379
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 565,
"timestamp": "2026-01-05T09:30:00Z",
"transaction_amount_usd": 117510.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.501,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4639465.52,
"financial_exposure_usd": 7037317.56,
"recoverable_pct": 0.976
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105710",
"label": "fraudulent",
"label_confidence": 0.605,
"severity": "medium",
"timestamp": "2026-01-04T23:10:00Z",
"trace_id": "f923c68e-3358-53c3-0265-eef47b091014"
} | {
"account_age_days": 784,
"account_id": "ACCT-CA56B95344F3",
"baseline_risk_score": 0.411,
"kyc_tier": "tier_2",
"session_entropy": 0.446
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1162,
"timestamp": "2026-01-04T23:10:00Z",
"transaction_amount_usd": 2496371.3
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.602,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6094529.8,
"financial_exposure_usd": 6896806.62,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104755",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "critical",
"timestamp": "2026-01-04T07:15:00Z",
"trace_id": "9dd0b7fe-c2b5-bce4-7f3e-1df16fc3bfe8"
} | {
"account_age_days": 1947,
"account_id": "ACCT-39181A0145FE",
"baseline_risk_score": 0.239,
"kyc_tier": "tier_2",
"session_entropy": 0.629
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 471,
"timestamp": "2026-01-04T07:15:00Z",
"transaction_amount_usd": 1482657.08
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.887,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1746116.7,
"financial_exposure_usd": 2138629.55,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108427",
"label": "benign",
"label_confidence": 0.543,
"severity": "low",
"timestamp": "2026-01-06T20:27:00Z",
"trace_id": "23fc9153-1e25-de2f-87d4-c629c1f8f258"
} | {
"account_age_days": 184,
"account_id": "ACCT-A3D3BE3AD478",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.113
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 635,
"timestamp": "2026-01-06T20:27:00Z",
"transaction_amount_usd": 3615.49
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.665,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1415.97,
"financial_exposure_usd": 2398.27,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103586",
"label": "fraudulent",
"label_confidence": 0.679,
"severity": "medium",
"timestamp": "2026-01-03T11:46:00Z",
"trace_id": "92ba541b-ddc4-4f07-c1a0-0facc77f5c65"
} | {
"account_age_days": 481,
"account_id": "ACCT-B641C3E2EC57",
"baseline_risk_score": 0.324,
"kyc_tier": "tier_2",
"session_entropy": 0.229
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 196,
"timestamp": "2026-01-03T11:46:00Z",
"transaction_amount_usd": 2828265.02
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.742,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 605123.8,
"financial_exposure_usd": 1430028.2,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103050",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "low",
"timestamp": "2026-01-03T02:50:00Z",
"trace_id": "d95c41eb-30c6-bb0e-33cb-552ec3984008"
} | {
"account_age_days": 861,
"account_id": "ACCT-56A22FD6339A",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_3",
"session_entropy": 0.775
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 295,
"timestamp": "2026-01-03T02:50:00Z",
"transaction_amount_usd": 98298.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.812,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 217348.69,
"financial_exposure_usd": 272645.1,
"recoverable_pct": 0.066
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106854",
"label": "benign",
"label_confidence": 0.699,
"severity": "low",
"timestamp": "2026-01-05T18:14:00Z",
"trace_id": "7760053e-efad-7950-aa5d-b59580a05e5f"
} | {
"account_age_days": 1776,
"account_id": "ACCT-C60FB4D318B4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.444
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 198,
"timestamp": "2026-01-05T16:56:00Z",
"transaction_amount_usd": 5.39
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.697,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 700.69,
"financial_exposure_usd": 1497.26,
"recoverable_pct": 0.902
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106496",
"label": "fraudulent",
"label_confidence": 0.704,
"severity": "medium",
"timestamp": "2026-01-05T12:16:00Z",
"trace_id": "ea369a2b-2c41-8132-b513-bf2c2647b063"
} | {
"account_age_days": 597,
"account_id": "ACCT-576F80A1A2B1",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_3",
"session_entropy": 0.419
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 353,
"timestamp": "2026-01-05T12:16:00Z",
"transaction_amount_usd": 2502443.83
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.422,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6447722.39,
"financial_exposure_usd": 7058709.37,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107368",
"label": "benign",
"label_confidence": 0.525,
"severity": "low",
"timestamp": "2026-01-06T02:48:00Z",
"trace_id": "1c624c78-3c06-44f6-5176-323e466f42e6"
} | {
"account_age_days": 1741,
"account_id": "ACCT-24A824EB1D69",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_3",
"session_entropy": 0.412
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 577,
"timestamp": "2026-01-06T02:48:00Z",
"transaction_amount_usd": 6267.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.626,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3057.16,
"financial_exposure_usd": 6361.39,
"recoverable_pct": 0.584
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101147",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-01T19:07:00Z",
"trace_id": "6aefcbd7-7ae1-102d-e338-acaa18c90b8b"
} | {
"account_age_days": 1948,
"account_id": "ACCT-E26A3364D177",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.542
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 523,
"timestamp": "2026-01-01T19:07:00Z",
"transaction_amount_usd": 74222.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.884,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 0, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 0,
"financial_exposure_usd": 0,
"recoverable_pct": 0.169
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108425",
"label": "benign",
"label_confidence": 0.507,
"severity": "medium",
"timestamp": "2026-01-06T20:25:00Z",
"trace_id": "b7b6155f-366d-7624-4abd-37dec2dc2868"
} | {
"account_age_days": 441,
"account_id": "ACCT-5E572283F449",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.364
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 319,
"timestamp": "2026-01-06T08:25:00Z",
"transaction_amount_usd": 24.52
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.499,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 527.42,
"financial_exposure_usd": 925.75,
"recoverable_pct": 0.816
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105517",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "low",
"timestamp": "2026-01-04T19:57:00Z",
"trace_id": "7a3bee88-4f72-e384-7e69-70cf1537cd5a"
} | {
"account_age_days": 701,
"account_id": "ACCT-787FFB9D53AA",
"baseline_risk_score": 0.413,
"kyc_tier": "tier_1",
"session_entropy": 0.248
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 272,
"timestamp": "2026-01-04T19:57:00Z",
"transaction_amount_usd": 254580.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.942,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5198868.53,
"financial_exposure_usd": 6183236.21,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109399",
"label": "benign",
"label_confidence": 0.49,
"severity": "high",
"timestamp": "2026-01-07T12:39:00Z",
"trace_id": "e0fd77e5-7fa5-debd-9c49-c9362202d4d3"
} | {
"account_age_days": 741,
"account_id": "ACCT-B685F06F3300",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.204
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 939,
"timestamp": "2026-01-07T12:39:00Z",
"transaction_amount_usd": 10927.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.737,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3616.04,
"financial_exposure_usd": 3831.28,
"recoverable_pct": 0.984
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100666",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "high",
"timestamp": "2026-01-01T11:06:00Z",
"trace_id": "ef9c783e-84dc-a558-c36e-91d9c27b6b3e"
} | {
"account_age_days": 243,
"account_id": "ACCT-C97F9769B749",
"baseline_risk_score": 0.445,
"kyc_tier": "tier_3",
"session_entropy": 0.322
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 658,
"timestamp": "2026-01-01T11:06:00Z",
"transaction_amount_usd": 63271.54
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.684,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 307573.76,
"financial_exposure_usd": 699947.52,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106946",
"label": "benign",
"label_confidence": 0.492,
"severity": "medium",
"timestamp": "2026-01-05T19:46:00Z",
"trace_id": "7631baf4-63aa-e3a0-24f6-8ae14679f457"
} | {
"account_age_days": 1204,
"account_id": "ACCT-A62D5D454F96",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.858
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 347,
"timestamp": "2026-01-05T11:08:00Z",
"transaction_amount_usd": 12.5
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5036.55,
"financial_exposure_usd": 5185.09,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108069",
"label": "benign",
"label_confidence": 0.566,
"severity": "medium",
"timestamp": "2026-01-06T14:29:00Z",
"trace_id": "a397609b-09a8-f73c-c568-9209993ca31f"
} | {
"account_age_days": 1088,
"account_id": "ACCT-B56EF3CB3FAC",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_1",
"session_entropy": 0.771
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 546,
"timestamp": "2026-01-06T14:29:00Z",
"transaction_amount_usd": 1802.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.747,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 961.77,
"financial_exposure_usd": 989.03,
"recoverable_pct": 0.864
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100536",
"label": "fraudulent",
"label_confidence": 0.798,
"severity": "high",
"timestamp": "2026-01-01T08:56:00Z",
"trace_id": "34cd130a-b193-fe29-0e53-9f2282dc6f92"
} | {
"account_age_days": 1154,
"account_id": "ACCT-C90012713A55",
"baseline_risk_score": 0.396,
"kyc_tier": "tier_2",
"session_entropy": 0.853
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NL",
"latency_ms": 141,
"timestamp": "2026-01-01T08:56:00Z",
"transaction_amount_usd": 75615.46
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.742,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 366857.27,
"financial_exposure_usd": 889526.45,
"recoverable_pct": 0.086
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101196",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "medium",
"timestamp": "2026-01-01T19:56:00Z",
"trace_id": "dd60c37c-00da-1c06-5003-232533e84c0c"
} | {
"account_age_days": 384,
"account_id": "ACCT-E68014050364",
"baseline_risk_score": 0.296,
"kyc_tier": "tier_3",
"session_entropy": 0.935
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 551,
"timestamp": "2026-01-01T19:56:00Z",
"transaction_amount_usd": 64400.26
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.755,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 996883.26,
"financial_exposure_usd": 1213237.59,
"recoverable_pct": 0.168
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107623",
"label": "benign",
"label_confidence": 0.599,
"severity": "medium",
"timestamp": "2026-01-06T07:03:00Z",
"trace_id": "769b7d01-32ba-1a6e-f958-717dda5b087f"
} | {
"account_age_days": 1369,
"account_id": "ACCT-C7557A90AB8E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.397
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 196,
"timestamp": "2026-01-06T03:16:00Z",
"transaction_amount_usd": 16.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.794,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 465.49,
"financial_exposure_usd": 553.15,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104126",
"label": "fraudulent",
"label_confidence": 0.943,
"severity": "medium",
"timestamp": "2026-01-03T20:46:00Z",
"trace_id": "371ca0af-9da6-4b35-6292-833159c8ed6a"
} | {
"account_age_days": 893,
"account_id": "ACCT-EE4D282AAE72",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_3",
"session_entropy": 0.212
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 148,
"timestamp": "2026-01-03T20:46:00Z",
"transaction_amount_usd": 2414860.57
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.827,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3709972.66,
"financial_exposure_usd": 4985482.51,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108438",
"label": "benign",
"label_confidence": 0.702,
"severity": "medium",
"timestamp": "2026-01-06T20:38:00Z",
"trace_id": "5319f0fc-f4bd-52aa-bfce-c45261aa1080"
} | {
"account_age_days": 1952,
"account_id": "ACCT-CC70FF0E9B41",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.884
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 347,
"timestamp": "2026-01-06T18:23:00Z",
"transaction_amount_usd": 5.87
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 335.38,
"financial_exposure_usd": 543.19,
"recoverable_pct": 0.575
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100591",
"label": "fraudulent",
"label_confidence": 0.973,
"severity": "high",
"timestamp": "2026-01-01T09:51:00Z",
"trace_id": "b8235d5e-e88f-fe9b-7cb1-52c219c6efa4"
} | {
"account_age_days": 1303,
"account_id": "ACCT-5306C1950116",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_1",
"session_entropy": 0.299
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 792,
"timestamp": "2026-01-01T09:51:00Z",
"transaction_amount_usd": 16691.46
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.444,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 491065.21,
"financial_exposure_usd": 602560.87,
"recoverable_pct": 0.35
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107080",
"label": "benign",
"label_confidence": 0.508,
"severity": "medium",
"timestamp": "2026-01-05T22:00:00Z",
"trace_id": "a2a4d717-28f2-a602-e7f3-bac7bc417534"
} | {
"account_age_days": 1061,
"account_id": "ACCT-B060873C9223",
"baseline_risk_score": 0.144,
"kyc_tier": "tier_2",
"session_entropy": 0.434
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 897,
"timestamp": "2026-01-05T22:00:00Z",
"transaction_amount_usd": 6026.89
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.632,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1593.05,
"financial_exposure_usd": 1839.17,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101902",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "critical",
"timestamp": "2026-01-02T07:42:00Z",
"trace_id": "117656c7-92dc-a0c4-e493-585f1496787c"
} | {
"account_age_days": 1147,
"account_id": "ACCT-7A8B34F2834C",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_1",
"session_entropy": 0.917
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 81,
"timestamp": "2026-01-02T07:42:00Z",
"transaction_amount_usd": 88195.11
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.495,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 176961.08,
"financial_exposure_usd": 362028.3,
"recoverable_pct": 0.171
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101350",
"label": "fraudulent",
"label_confidence": 0.924,
"severity": "medium",
"timestamp": "2026-01-01T22:30:00Z",
"trace_id": "0e2ab7b0-a42d-fed1-b9a5-042ce4c5a7d1"
} | {
"account_age_days": 1135,
"account_id": "ACCT-547B7C17017A",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.529
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1139,
"timestamp": "2026-01-01T22:30:00Z",
"transaction_amount_usd": 105701.21
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.622,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 369541,
"financial_exposure_usd": 401692.17,
"recoverable_pct": 0.007
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104481",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-04T02:41:00Z",
"trace_id": "d1096adb-9fb2-b2ee-b490-939446919fea"
} | {
"account_age_days": 875,
"account_id": "ACCT-CB28703B617B",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_2",
"session_entropy": 0.619
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 560,
"timestamp": "2026-01-04T02:41:00Z",
"transaction_amount_usd": 2377677.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.875,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1348257.01,
"financial_exposure_usd": 3229133.82,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105886",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "low",
"timestamp": "2026-01-05T02:06:00Z",
"trace_id": "a55d215e-c8ee-30c4-e3fa-d5841ca0e706"
} | {
"account_age_days": 1128,
"account_id": "ACCT-D19CB74BB1E4",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_3",
"session_entropy": 0.901
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 431,
"timestamp": "2026-01-05T02:06:00Z",
"transaction_amount_usd": 2495841.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.417,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1166548.07,
"financial_exposure_usd": 1677412.08,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108203",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-06T16:43:00Z",
"trace_id": "3597490f-41c7-fd2b-eb0a-a7c5880f2e3e"
} | {
"account_age_days": 683,
"account_id": "ACCT-476B5BDBA4B7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.745
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 621,
"timestamp": "2026-01-06T16:43:00Z",
"transaction_amount_usd": 11982.04
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pri... | {
"customer_funds_at_risk_usd": 2897.17,
"financial_exposure_usd": 4160.84,
"recoverable_pct": 0.495
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105080",
"label": "fraudulent",
"label_confidence": 0.611,
"severity": "medium",
"timestamp": "2026-01-04T12:40:00Z",
"trace_id": "d90845ff-4b86-761f-3f19-27eeab9bbb3c"
} | {
"account_age_days": 956,
"account_id": "ACCT-0532222FFA92",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_3",
"session_entropy": 0.795
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 547,
"timestamp": "2026-01-04T12:40:00Z",
"transaction_amount_usd": 2331246.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.376,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2880580.32,
"financial_exposure_usd": 4994047.47,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103669",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "high",
"timestamp": "2026-01-03T13:09:00Z",
"trace_id": "0d4b91a9-8587-ebe1-4cdb-fcf606eaac50"
} | {
"account_age_days": 1317,
"account_id": "ACCT-771B4DD868BA",
"baseline_risk_score": 0.291,
"kyc_tier": "tier_3",
"session_entropy": 0.221
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 146,
"timestamp": "2026-01-03T10:50:00Z",
"transaction_amount_usd": 19.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.808,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6694767.43,
"financial_exposure_usd": 7779156.57,
"recoverable_pct": 0.767
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103287",
"label": "fraudulent",
"label_confidence": 0.967,
"severity": "high",
"timestamp": "2026-01-03T06:47:00Z",
"trace_id": "41153a97-362a-2c84-497c-0f3d0500e032"
} | {
"account_age_days": 1419,
"account_id": "ACCT-4D0EC7B81E58",
"baseline_risk_score": 0.472,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "LU",
"latency_ms": 1034,
"timestamp": "2026-01-03T06:47:00Z",
"transaction_amount_usd": 40214.03
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.684,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 415241.27,
"financial_exposure_usd": 566110.38,
"recoverable_pct": 0.314
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101244",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "high",
"timestamp": "2026-01-01T20:44:00Z",
"trace_id": "662e7b01-9232-33d0-9468-1f2af3ba6acd"
} | {
"account_age_days": 911,
"account_id": "ACCT-3415665A37C6",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_1",
"session_entropy": 0.316
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 321,
"timestamp": "2026-01-01T18:01:00Z",
"transaction_amount_usd": 12.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.625,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 486393.21,
"financial_exposure_usd": 933720.89,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106698",
"label": "benign",
"label_confidence": 0.66,
"severity": "medium",
"timestamp": "2026-01-05T15:38:00Z",
"trace_id": "a1df2ef4-cc80-ce69-345d-2525d85347ea"
} | {
"account_age_days": 739,
"account_id": "ACCT-25DE1CAD1007",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.72
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 491,
"timestamp": "2026-01-05T15:38:00Z",
"transaction_amount_usd": 1321.4
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2234.25,
"financial_exposure_usd": 3564.46,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101432",
"label": "fraudulent",
"label_confidence": 0.764,
"severity": "high",
"timestamp": "2026-01-01T23:52:00Z",
"trace_id": "24b4da50-aa8f-5ad0-1212-209b3a0d08af"
} | {
"account_age_days": 1343,
"account_id": "ACCT-1481C309B844",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_1",
"session_entropy": 0.597
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 209,
"timestamp": "2026-01-01T13:13:00Z",
"transaction_amount_usd": 2.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.942,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 351555.62,
"financial_exposure_usd": 364673.35,
"recoverable_pct": 0.57
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106100",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "low",
"timestamp": "2026-01-05T05:40:00Z",
"trace_id": "fc5b0ba7-8c06-55e7-5c5f-7194a7e4e19a"
} | {
"account_age_days": 680,
"account_id": "ACCT-BE93B564433B",
"baseline_risk_score": 0.205,
"kyc_tier": "tier_1",
"session_entropy": 0.854
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 137,
"timestamp": "2026-01-05T05:40:00Z",
"transaction_amount_usd": 1782529.45
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.551,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3324247.56,
"financial_exposure_usd": 7131493.74,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109863",
"label": "benign",
"label_confidence": 0.564,
"severity": "low",
"timestamp": "2026-01-07T20:23:00Z",
"trace_id": "6298cd30-9e0e-bc7e-7f89-4069bde985a5"
} | {
"account_age_days": 594,
"account_id": "ACCT-8F64C51E1C33",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 270,
"timestamp": "2026-01-07T20:23:00Z",
"transaction_amount_usd": 417.68
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.717,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2365.19,
"financial_exposure_usd": 5226.85,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109717",
"label": "benign",
"label_confidence": 0.513,
"severity": "critical",
"timestamp": "2026-01-07T17:57:00Z",
"trace_id": "b7f6f94b-511d-7313-4379-185e45768a38"
} | {
"account_age_days": 1243,
"account_id": "ACCT-8A65E441563F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.897
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1095,
"timestamp": "2026-01-07T17:57:00Z",
"transaction_amount_usd": 6574.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 43.23,
"financial_exposure_usd": 69.78,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108145",
"label": "benign",
"label_confidence": 0.58,
"severity": "high",
"timestamp": "2026-01-06T15:45:00Z",
"trace_id": "708a96aa-d52a-fbe0-20c7-018364a1c125"
} | {
"account_age_days": 1292,
"account_id": "ACCT-290435FCE721",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.837
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 843,
"timestamp": "2026-01-06T15:45:00Z",
"transaction_amount_usd": 11469.8
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.465,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1594.93,
"financial_exposure_usd": 3742.88,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105146",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "high",
"timestamp": "2026-01-04T13:46:00Z",
"trace_id": "64a5d3c6-b0a6-b7e1-b4eb-275d6a7ef5fe"
} | {
"account_age_days": 1655,
"account_id": "ACCT-AEEA56795C7A",
"baseline_risk_score": 0.195,
"kyc_tier": "tier_2",
"session_entropy": 0.874
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 196,
"timestamp": "2026-01-04T04:18:00Z",
"transaction_amount_usd": 5.36
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.727,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3823853.71,
"financial_exposure_usd": 4820063.69,
"recoverable_pct": 0.719
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105374",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "high",
"timestamp": "2026-01-04T17:34:00Z",
"trace_id": "27a552df-be74-5a10-6228-ad247ed18a7e"
} | {
"account_age_days": 1841,
"account_id": "ACCT-717A0BA14011",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_2",
"session_entropy": 0.941
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1124,
"timestamp": "2026-01-04T17:34:00Z",
"transaction_amount_usd": 1635495.08
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.78,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND p... | {
"customer_funds_at_risk_usd": 1642183.2,
"financial_exposure_usd": 2670512.22,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104982",
"label": "fraudulent",
"label_confidence": 0.834,
"severity": "high",
"timestamp": "2026-01-04T11:02:00Z",
"trace_id": "91ff67f0-4e1f-ed5b-7c00-bf4a0d340a4f"
} | {
"account_age_days": 782,
"account_id": "ACCT-CDCB4E3246BC",
"baseline_risk_score": 0.3,
"kyc_tier": "tier_1",
"session_entropy": 0.621
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 1016,
"timestamp": "2026-01-04T11:02:00Z",
"transaction_amount_usd": 240860.2
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.575,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5197027.14,
"financial_exposure_usd": 5276765.63,
"recoverable_pct": 0.868
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105036",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "medium",
"timestamp": "2026-01-04T11:56:00Z",
"trace_id": "c1b1f171-8291-5f84-c7c1-209bb18135cf"
} | {
"account_age_days": 448,
"account_id": "ACCT-C0BD7FBE0E34",
"baseline_risk_score": 0.386,
"kyc_tier": "tier_1",
"session_entropy": 0.61
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 406,
"timestamp": "2026-01-04T11:56:00Z",
"transaction_amount_usd": 2956305.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.358,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5631550.7,
"financial_exposure_usd": 7881935.91,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106695",
"label": "benign",
"label_confidence": 0.597,
"severity": "low",
"timestamp": "2026-01-05T15:35:00Z",
"trace_id": "cd010077-fda3-e0d1-5ca9-8375492b44c3"
} | {
"account_age_days": 1440,
"account_id": "ACCT-195F086DF0DC",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.648
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 249,
"timestamp": "2026-01-05T15:35:00Z",
"transaction_amount_usd": 10885.22
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.602,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2390.3,
"financial_exposure_usd": 5413.51,
"recoverable_pct": 0.593
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103207",
"label": "fraudulent",
"label_confidence": 0.877,
"severity": "medium",
"timestamp": "2026-01-03T05:27:00Z",
"trace_id": "6469b91b-8019-3314-c7e3-dd618cb9ccf9"
} | {
"account_age_days": 1307,
"account_id": "ACCT-C1802C5FEB69",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_1",
"session_entropy": 0.345
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 239,
"timestamp": "2026-01-03T05:27:00Z",
"transaction_amount_usd": 48531.26
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.76,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 637291.8,
"financial_exposure_usd": 650005.14,
"recoverable_pct": 0.503
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100088",
"label": "fraudulent",
"label_confidence": 0.913,
"severity": "critical",
"timestamp": "2026-01-01T01:28:00Z",
"trace_id": "d1ccc8d3-c167-6505-43af-6c46a46b3932"
} | {
"account_age_days": 1347,
"account_id": "ACCT-9ACCB00DDB3F",
"baseline_risk_score": 0.505,
"kyc_tier": "tier_3",
"session_entropy": 0.21
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 199,
"timestamp": "2025-12-31T22:45:00Z",
"transaction_amount_usd": 11.91
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.832,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 636529.73,
"financial_exposure_usd": 678891.92,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105526",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "medium",
"timestamp": "2026-01-04T20:06:00Z",
"trace_id": "dbf9a5ad-e6d2-7a23-55c3-dd2643d93a65"
} | {
"account_age_days": 1114,
"account_id": "ACCT-B33BB041F5F2",
"baseline_risk_score": 0.051,
"kyc_tier": "tier_2",
"session_entropy": 0.938
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 983,
"timestamp": "2026-01-04T20:06:00Z",
"transaction_amount_usd": 2581068.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.788,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2719549.27,
"financial_exposure_usd": 3908879.66,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101082",
"label": "fraudulent",
"label_confidence": 0.838,
"severity": "critical",
"timestamp": "2026-01-01T18:02:00Z",
"trace_id": "a97629e4-21b0-4c29-46f8-1c8d72cc147c"
} | {
"account_age_days": 1399,
"account_id": "ACCT-244764033982",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_1",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 383,
"timestamp": "2026-01-01T18:02:00Z",
"transaction_amount_usd": 25697.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.841,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1028988.95,
"financial_exposure_usd": 1376356.22,
"recoverable_pct": 0.751
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101468",
"label": "fraudulent",
"label_confidence": 0.813,
"severity": "medium",
"timestamp": "2026-01-02T00:28:00Z",
"trace_id": "d517f641-057d-b865-54f6-325666df52a3"
} | {
"account_age_days": 1806,
"account_id": "ACCT-CB04CE570060",
"baseline_risk_score": 0.568,
"kyc_tier": "tier_3",
"session_entropy": 0.444
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 282,
"timestamp": "2026-01-02T00:28:00Z",
"transaction_amount_usd": 99725.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.583,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 692735.4,
"financial_exposure_usd": 706347.95,
"recoverable_pct": 0.471
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102474",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "medium",
"timestamp": "2026-01-02T17:14:00Z",
"trace_id": "4bed1400-f4da-4570-d36d-648e7bd038b3"
} | {
"account_age_days": 1557,
"account_id": "ACCT-3EDE8975B6A5",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.328
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 314,
"timestamp": "2026-01-02T11:48:00Z",
"transaction_amount_usd": 7.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.515,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 933836.5,
"financial_exposure_usd": 980310.45,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106312",
"label": "fraudulent",
"label_confidence": 0.612,
"severity": "low",
"timestamp": "2026-01-05T09:12:00Z",
"trace_id": "ec328f76-d208-96f5-1b12-1db779433a61"
} | {
"account_age_days": 1607,
"account_id": "ACCT-1BED819942F3",
"baseline_risk_score": 0.164,
"kyc_tier": "tier_1",
"session_entropy": 0.163
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 499,
"timestamp": "2026-01-05T09:12:00Z",
"transaction_amount_usd": 1808596.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3385010.35,
"financial_exposure_usd": 7592671.95,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109827",
"label": "benign",
"label_confidence": 0.686,
"severity": "medium",
"timestamp": "2026-01-07T19:47:00Z",
"trace_id": "86967f0c-a15f-f556-1d3e-0426974908d0"
} | {
"account_age_days": 509,
"account_id": "ACCT-BE08E9E72B50",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.302
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 915,
"timestamp": "2026-01-07T19:47:00Z",
"transaction_amount_usd": 3453.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.63,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1763.93,
"financial_exposure_usd": 2085.95,
"recoverable_pct": 0.421
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100765",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "medium",
"timestamp": "2026-01-01T12:45:00Z",
"trace_id": "1b6e82f3-2d25-c3f3-ed06-adf60c2635c6"
} | {
"account_age_days": 1709,
"account_id": "ACCT-E3ADF2FBDA6C",
"baseline_risk_score": 0.385,
"kyc_tier": "tier_1",
"session_entropy": 0.34
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 1051,
"timestamp": "2026-01-01T12:45:00Z",
"transaction_amount_usd": 9795.65
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.446,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 477559.53,
"financial_exposure_usd": 721178.55,
"recoverable_pct": 0.384
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103152",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "low",
"timestamp": "2026-01-03T04:32:00Z",
"trace_id": "780b9e88-0a3c-364c-9182-b62c3f5c874a"
} | {
"account_age_days": 817,
"account_id": "ACCT-2FB7481F10D5",
"baseline_risk_score": 0.336,
"kyc_tier": "tier_1",
"session_entropy": 0.321
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 118,
"timestamp": "2026-01-03T04:32:00Z",
"transaction_amount_usd": 34977.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.802,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 530895.16,
"financial_exposure_usd": 811677,
"recoverable_pct": 0.66
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101004",
"label": "fraudulent",
"label_confidence": 0.846,
"severity": "high",
"timestamp": "2026-01-01T16:44:00Z",
"trace_id": "7482ae0a-97d6-4d7b-0a60-52a80067a623"
} | {
"account_age_days": 1484,
"account_id": "ACCT-4E23A74AA081",
"baseline_risk_score": 0.45,
"kyc_tier": "tier_1",
"session_entropy": 0.706
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 361,
"timestamp": "2026-01-01T16:44:00Z",
"transaction_amount_usd": 102091.63
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.864,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 188122.96,
"financial_exposure_usd": 248173.89,
"recoverable_pct": 0.171
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104163",
"label": "fraudulent",
"label_confidence": 0.63,
"severity": "high",
"timestamp": "2026-01-03T21:23:00Z",
"trace_id": "3d345a23-3a55-7e50-0e05-79d25c88548e"
} | {
"account_age_days": 1499,
"account_id": "ACCT-4997BF33B5BE",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_1",
"session_entropy": 0.87
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 998,
"timestamp": "2026-01-03T21:23:00Z",
"transaction_amount_usd": 136393.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.493,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1229168.36,
"financial_exposure_usd": 2915750.98,
"recoverable_pct": 0.854
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103461",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "medium",
"timestamp": "2026-01-03T09:41:00Z",
"trace_id": "551ba470-8ed9-0000-57d6-b9142024ef09"
} | {
"account_age_days": 718,
"account_id": "ACCT-CD039FFAC862",
"baseline_risk_score": 0.118,
"kyc_tier": "tier_1",
"session_entropy": 0.355
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1157,
"timestamp": "2026-01-03T09:41:00Z",
"transaction_amount_usd": 1379254.41
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.776,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1850110.61,
"financial_exposure_usd": 3416438.6,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108844",
"label": "benign",
"label_confidence": 0.739,
"severity": "medium",
"timestamp": "2026-01-07T03:24:00Z",
"trace_id": "823eee91-ee72-c2d0-9f4d-b2776b8364ce"
} | {
"account_age_days": 1859,
"account_id": "ACCT-EE9E0389138A",
"baseline_risk_score": 0.071,
"kyc_tier": "tier_3",
"session_entropy": 0.905
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 1074,
"timestamp": "2026-01-07T03:24:00Z",
"transaction_amount_usd": 2455.45
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 3933.42,
"financial_exposure_usd": 7252.19,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106989",
"label": "benign",
"label_confidence": 0.665,
"severity": "medium",
"timestamp": "2026-01-05T20:29:00Z",
"trace_id": "98dab838-b8c2-692f-a8ff-2a1a10e9a1be"
} | {
"account_age_days": 492,
"account_id": "ACCT-5FCD33DF293E",
"baseline_risk_score": 0.181,
"kyc_tier": "tier_3",
"session_entropy": 0.275
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 183,
"timestamp": "2026-01-05T15:25:00Z",
"transaction_amount_usd": 16.7
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.689,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 467.02,
"financial_exposure_usd": 957.16,
"recoverable_pct": 0.603
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104391",
"label": "fraudulent",
"label_confidence": 0.776,
"severity": "medium",
"timestamp": "2026-01-04T01:11:00Z",
"trace_id": "dc367e7c-cf00-c32e-be88-a70b54e25c5f"
} | {
"account_age_days": 143,
"account_id": "ACCT-5F7E6CED3B8A",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_3",
"session_entropy": 0.781
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 924,
"timestamp": "2026-01-04T01:11:00Z",
"transaction_amount_usd": 2788911.5
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.53,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2720024.47,
"financial_exposure_usd": 5923801.16,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105717",
"label": "fraudulent",
"label_confidence": 0.604,
"severity": "medium",
"timestamp": "2026-01-04T23:17:00Z",
"trace_id": "f5a86cf7-e35c-1653-f862-b7695362e8cd"
} | {
"account_age_days": 304,
"account_id": "ACCT-13C921668885",
"baseline_risk_score": 0.269,
"kyc_tier": "tier_3",
"session_entropy": 0.66
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 108,
"timestamp": "2026-01-04T23:17:00Z",
"transaction_amount_usd": 861111.94
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.945,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1135884.74,
"financial_exposure_usd": 1983437.56,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104743",
"label": "fraudulent",
"label_confidence": 0.788,
"severity": "high",
"timestamp": "2026-01-04T07:03:00Z",
"trace_id": "e47015b1-62a6-98f1-887e-4555a781d031"
} | {
"account_age_days": 1414,
"account_id": "ACCT-73F9E5AFC395",
"baseline_risk_score": 0.27,
"kyc_tier": "tier_3",
"session_entropy": 0.421
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 522,
"timestamp": "2026-01-04T07:03:00Z",
"transaction_amount_usd": 72673.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4839626.28,
"financial_exposure_usd": 4889456.36,
"recoverable_pct": 0.912
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106959",
"label": "benign",
"label_confidence": 0.743,
"severity": "medium",
"timestamp": "2026-01-05T19:59:00Z",
"trace_id": "8572331c-93f3-a338-3e77-9a50106bdb6e"
} | {
"account_age_days": 153,
"account_id": "ACCT-381E0D952509",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.427
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 296,
"timestamp": "2026-01-05T12:45:00Z",
"transaction_amount_usd": 6.22
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5238.49,
"financial_exposure_usd": 5735.86,
"recoverable_pct": 0.781
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109932",
"label": "benign",
"label_confidence": 0.7,
"severity": "medium",
"timestamp": "2026-01-07T21:32:00Z",
"trace_id": "1fa7bbeb-0fd4-d441-32a0-c94c9bb10a56"
} | {
"account_age_days": 1488,
"account_id": "ACCT-737577DC7F76",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_2",
"session_entropy": 0.539
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 347,
"timestamp": "2026-01-07T16:44:00Z",
"transaction_amount_usd": 3.8
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.733,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2680.44,
"financial_exposure_usd": 3061.8,
"recoverable_pct": 0.534
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107522",
"label": "benign",
"label_confidence": 0.505,
"severity": "high",
"timestamp": "2026-01-06T05:22:00Z",
"trace_id": "b1b28a9e-5b23-c936-908d-00fb50ed796e"
} | {
"account_age_days": 355,
"account_id": "ACCT-6AFE5D307056",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.193
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 140,
"timestamp": "2026-01-06T05:22:00Z",
"transaction_amount_usd": 8629.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.744,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1722.47,
"financial_exposure_usd": 3503.9,
"recoverable_pct": 0.424
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105492",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-04T19:32:00Z",
"trace_id": "aebaa0e2-327c-fe30-1ac8-59009211350b"
} | {
"account_age_days": 728,
"account_id": "ACCT-9D6D6D627549",
"baseline_risk_score": 0.231,
"kyc_tier": "tier_1",
"session_entropy": 0.13
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 131,
"timestamp": "2026-01-04T09:47:00Z",
"transaction_amount_usd": 4.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.67,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 4851658.96,
"financial_exposure_usd": 5200833.14,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100930",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "critical",
"timestamp": "2026-01-01T15:30:00Z",
"trace_id": "1a7a4b25-d0ce-67c7-a226-ccb626f8b1ef"
} | {
"account_age_days": 1264,
"account_id": "ACCT-12C22F83ACC4",
"baseline_risk_score": 0.599,
"kyc_tier": "tier_1",
"session_entropy": 0.43
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 204,
"timestamp": "2026-01-01T07:19:00Z",
"transaction_amount_usd": 6.84
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.361,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 695982.75,
"financial_exposure_usd": 892982.48,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100429",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "medium",
"timestamp": "2026-01-01T07:09:00Z",
"trace_id": "cecc736e-e847-d6b7-0c0d-c1864de3dd66"
} | {
"account_age_days": 1303,
"account_id": "ACCT-B74A4D14CC8D",
"baseline_risk_score": 0.632,
"kyc_tier": "tier_3",
"session_entropy": 0.487
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 378,
"timestamp": "2026-01-01T04:41:00Z",
"transaction_amount_usd": 8.26
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.856,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 678971.77,
"financial_exposure_usd": 793022.2,
"recoverable_pct": 0.038
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102723",
"label": "fraudulent",
"label_confidence": 0.955,
"severity": "high",
"timestamp": "2026-01-02T21:23:00Z",
"trace_id": "256755f8-8ea2-db9f-d378-7ba3e9d242a3"
} | {
"account_age_days": 670,
"account_id": "ACCT-94D87D2978E7",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_2",
"session_entropy": 0.862
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 786,
"timestamp": "2026-01-02T21:23:00Z",
"transaction_amount_usd": 23890.37
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.718,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 845850.66,
"financial_exposure_usd": 1331025.55,
"recoverable_pct": 0.219
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109948",
"label": "benign",
"label_confidence": 0.542,
"severity": "high",
"timestamp": "2026-01-07T21:48:00Z",
"trace_id": "553b053b-7d33-809d-adb6-dc93996ececb"
} | {
"account_age_days": 78,
"account_id": "ACCT-10B9FF36A292",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.798
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 515,
"timestamp": "2026-01-07T21:48:00Z",
"transaction_amount_usd": 7652.44
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1292.17,
"financial_exposure_usd": 1558.55,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102297",
"label": "fraudulent",
"label_confidence": 0.923,
"severity": "high",
"timestamp": "2026-01-02T14:17:00Z",
"trace_id": "52d85533-52aa-343b-f734-41a2c8250b37"
} | {
"account_age_days": 718,
"account_id": "ACCT-67CD6526DBFC",
"baseline_risk_score": 0.472,
"kyc_tier": "tier_3",
"session_entropy": 0.213
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 940,
"timestamp": "2026-01-02T14:17:00Z",
"transaction_amount_usd": 102802.09
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.394,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 852645.03,
"financial_exposure_usd": 861864.83,
"recoverable_pct": 0.788
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101752",
"label": "fraudulent",
"label_confidence": 0.894,
"severity": "high",
"timestamp": "2026-01-02T05:12:00Z",
"trace_id": "d018a053-7a60-5c2d-10e7-5af75eef7405"
} | {
"account_age_days": 1312,
"account_id": "ACCT-56A995F10D46",
"baseline_risk_score": 0.596,
"kyc_tier": "tier_1",
"session_entropy": 0.903
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 182,
"timestamp": "2026-01-02T05:12:00Z",
"transaction_amount_usd": 35663.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.792,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 221129.84,
"financial_exposure_usd": 229684.69,
"recoverable_pct": 0.314
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108022",
"label": "benign",
"label_confidence": 0.501,
"severity": "medium",
"timestamp": "2026-01-06T13:42:00Z",
"trace_id": "75f71f78-dbc5-5f9f-e146-798ee254f664"
} | {
"account_age_days": 277,
"account_id": "ACCT-E5863D5B5C0B",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.946
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 200,
"timestamp": "2026-01-06T07:18:00Z",
"transaction_amount_usd": 1.13
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2934.36,
"financial_exposure_usd": 3017.79,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109645",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-07T16:45:00Z",
"trace_id": "70ce739c-af8f-1ed7-3730-98af9403be4d"
} | {
"account_age_days": 1891,
"account_id": "ACCT-2E751BD576AE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.575
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 169,
"timestamp": "2026-01-07T16:45:00Z",
"transaction_amount_usd": 5617.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 863.79,
"financial_exposure_usd": 981.72,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106408",
"label": "fraudulent",
"label_confidence": 0.835,
"severity": "high",
"timestamp": "2026-01-05T10:48:00Z",
"trace_id": "262cfca9-7a5f-0c94-d709-aba36532eba4"
} | {
"account_age_days": 808,
"account_id": "ACCT-E831618A82B7",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_2",
"session_entropy": 0.265
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 311,
"timestamp": "2026-01-05T00:40:00Z",
"transaction_amount_usd": 22.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.681,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3751610.25,
"financial_exposure_usd": 5587926.17,
"recoverable_pct": 0.874
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100587",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "critical",
"timestamp": "2026-01-01T09:47:00Z",
"trace_id": "5b9f15c8-fa63-4f76-c34b-a4589fc63a31"
} | {
"account_age_days": 1741,
"account_id": "ACCT-66C676F2E5A2",
"baseline_risk_score": 0.35,
"kyc_tier": "tier_3",
"session_entropy": 0.56
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1180,
"timestamp": "2026-01-01T09:47:00Z",
"transaction_amount_usd": 16710.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 216555.96,
"financial_exposure_usd": 304436.7,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103959",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-03T17:59:00Z",
"trace_id": "50d6006c-6066-1430-a733-4c7ee73699c0"
} | {
"account_age_days": 389,
"account_id": "ACCT-1A9AD22FC83D",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_3",
"session_entropy": 0.772
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 122,
"timestamp": "2026-01-03T13:07:00Z",
"transaction_amount_usd": 0.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.758,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 743942.94,
"financial_exposure_usd": 1428203.91,
"recoverable_pct": 0.898
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107438",
"label": "benign",
"label_confidence": 0.527,
"severity": "low",
"timestamp": "2026-01-06T03:58:00Z",
"trace_id": "de4a6f22-7eb0-bf4b-af69-f592cf0481e6"
} | {
"account_age_days": 1412,
"account_id": "ACCT-308646114261",
"baseline_risk_score": 0.156,
"kyc_tier": "tier_3",
"session_entropy": 0.578
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 268,
"timestamp": "2026-01-06T03:58:00Z",
"transaction_amount_usd": 9329.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4728.16,
"financial_exposure_usd": 11259.01,
"recoverable_pct": 0.443
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105591",
"label": "fraudulent",
"label_confidence": 0.611,
"severity": "critical",
"timestamp": "2026-01-04T21:11:00Z",
"trace_id": "2a66d2bf-43b6-0bf8-ac7e-06625b842218"
} | {
"account_age_days": 711,
"account_id": "ACCT-E39675E916F1",
"baseline_risk_score": 0.346,
"kyc_tier": "tier_3",
"session_entropy": 0.496
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 312,
"timestamp": "2026-01-04T19:35:00Z",
"transaction_amount_usd": 17.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.465,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5162890.81,
"financial_exposure_usd": 6734942.21,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106833",
"label": "benign",
"label_confidence": 0.461,
"severity": "high",
"timestamp": "2026-01-05T17:53:00Z",
"trace_id": "c8edf524-0b40-3d04-11cb-7b6c44e8aa88"
} | {
"account_age_days": 557,
"account_id": "ACCT-C34D532F72EB",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_1",
"session_entropy": 0.626
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 986,
"timestamp": "2026-01-05T17:53:00Z",
"transaction_amount_usd": 11399.61
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1361.19,
"financial_exposure_usd": 2212.01,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100838",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "high",
"timestamp": "2026-01-01T13:58:00Z",
"trace_id": "644cc88b-c5ba-85a4-b1b1-4337c7839efe"
} | {
"account_age_days": 699,
"account_id": "ACCT-DC003B463F50",
"baseline_risk_score": 0.381,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 109,
"timestamp": "2026-01-01T05:34:00Z",
"transaction_amount_usd": 4.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.395,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 668613.44,
"financial_exposure_usd": 788832.71,
"recoverable_pct": 0.074
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107096",
"label": "benign",
"label_confidence": 0.561,
"severity": "low",
"timestamp": "2026-01-05T22:16:00Z",
"trace_id": "35ef9a0b-cb49-6178-59dd-cd8ff092c5df"
} | {
"account_age_days": 376,
"account_id": "ACCT-816FD88D5BBD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.675
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 952,
"timestamp": "2026-01-05T22:16:00Z",
"transaction_amount_usd": 3052.59
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.457,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1087.69,
"financial_exposure_usd": 1394.45,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108569",
"label": "benign",
"label_confidence": 0.628,
"severity": "low",
"timestamp": "2026-01-06T22:49:00Z",
"trace_id": "62bc9b71-9d36-a6c2-d7dc-acd0eaab071c"
} | {
"account_age_days": 1939,
"account_id": "ACCT-6EEF4243B739",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.571
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 655,
"timestamp": "2026-01-06T22:49:00Z",
"transaction_amount_usd": 3817.37
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3535.06,
"financial_exposure_usd": 5871.92,
"recoverable_pct": 0.826
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103913",
"label": "fraudulent",
"label_confidence": 0.678,
"severity": "low",
"timestamp": "2026-01-03T17:13:00Z",
"trace_id": "5162dd0a-42a5-ec9b-f708-75882d730320"
} | {
"account_age_days": 1282,
"account_id": "ACCT-4A591A2A01AC",
"baseline_risk_score": 0.366,
"kyc_tier": "tier_2",
"session_entropy": 0.452
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1164,
"timestamp": "2026-01-03T17:13:00Z",
"transaction_amount_usd": 1406959.68
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.772,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4266122.15,
"financial_exposure_usd": 5470419.12,
"recoverable_pct": 0.919
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104546",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "medium",
"timestamp": "2026-01-04T03:46:00Z",
"trace_id": "d5fbb47c-225f-8be6-d1c5-773322e78adf"
} | {
"account_age_days": 929,
"account_id": "ACCT-0785D68385C1",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_1",
"session_entropy": 0.923
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 141,
"timestamp": "2026-01-04T03:46:00Z",
"transaction_amount_usd": 2279546.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.694,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3957291.03,
"financial_exposure_usd": 5704152.28,
"recoverable_pct": 0.668
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105613",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "high",
"timestamp": "2026-01-04T21:33:00Z",
"trace_id": "ce6825a0-2b27-9485-4ecc-0d622be11934"
} | {
"account_age_days": 1893,
"account_id": "ACCT-540FC775D39A",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_2",
"session_entropy": 0.366
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 259,
"timestamp": "2026-01-04T13:59:00Z",
"transaction_amount_usd": 7.45
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.814,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1832448.26,
"financial_exposure_usd": 1915716.19,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103253",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "medium",
"timestamp": "2026-01-03T06:13:00Z",
"trace_id": "075f4ea4-03de-4240-ebfd-b3a0229f9463"
} | {
"account_age_days": 522,
"account_id": "ACCT-C807B63F19A3",
"baseline_risk_score": 0.304,
"kyc_tier": "tier_1",
"session_entropy": 0.542
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 575,
"timestamp": "2026-01-03T06:13:00Z",
"transaction_amount_usd": 8713.15
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.365,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 832197.26,
"financial_exposure_usd": 1030149.11,
"recoverable_pct": 0.328
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101332",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "medium",
"timestamp": "2026-01-01T22:12:00Z",
"trace_id": "87f65b7d-a2ab-85a5-f469-865ce9f67923"
} | {
"account_age_days": 1024,
"account_id": "ACCT-A4FF94ED8765",
"baseline_risk_score": 0.347,
"kyc_tier": "tier_2",
"session_entropy": 0.645
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 869,
"timestamp": "2026-01-01T22:12:00Z",
"transaction_amount_usd": 73034.94
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.811,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 553628.46,
"financial_exposure_usd": 624512.05,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107949",
"label": "benign",
"label_confidence": 0.732,
"severity": "low",
"timestamp": "2026-01-06T12:29:00Z",
"trace_id": "2e4882db-c477-178a-879f-1eee22bbba64"
} | {
"account_age_days": 1479,
"account_id": "ACCT-9D6142CF3EA1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.374
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 319,
"timestamp": "2026-01-06T00:13:00Z",
"transaction_amount_usd": 8.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.776,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2084.61,
"financial_exposure_usd": 3860.56,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108526",
"label": "benign",
"label_confidence": 0.548,
"severity": "high",
"timestamp": "2026-01-06T22:06:00Z",
"trace_id": "e066337f-99d4-4d57-f2b4-b2350e5b9fb4"
} | {
"account_age_days": 1957,
"account_id": "ACCT-88FFC4DFCBA6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.36
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1038,
"timestamp": "2026-01-06T22:06:00Z",
"transaction_amount_usd": 8690.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.629,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 684.15,
"financial_exposure_usd": 1017.55,
"recoverable_pct": 0.988
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108904",
"label": "benign",
"label_confidence": 0.463,
"severity": "low",
"timestamp": "2026-01-07T04:24:00Z",
"trace_id": "cc62aa54-6854-e8cb-0471-850faaae9bb0"
} | {
"account_age_days": 826,
"account_id": "ACCT-AF7F60663296",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.846
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 136,
"timestamp": "2026-01-07T04:24:00Z",
"transaction_amount_usd": 1905.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.484,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1473.16,
"financial_exposure_usd": 1992.75,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107811",
"label": "benign",
"label_confidence": 0.478,
"severity": "medium",
"timestamp": "2026-01-06T10:11:00Z",
"trace_id": "c6b6e815-79be-69c7-e836-b537612720c2"
} | {
"account_age_days": 143,
"account_id": "ACCT-C93FE1097013",
"baseline_risk_score": 0.135,
"kyc_tier": "tier_2",
"session_entropy": 0.203
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 838,
"timestamp": "2026-01-06T10:11:00Z",
"transaction_amount_usd": 14748.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.633,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 469.3,
"financial_exposure_usd": 776.58,
"recoverable_pct": 0.634
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109365",
"label": "benign",
"label_confidence": 0.459,
"severity": "low",
"timestamp": "2026-01-07T12:05:00Z",
"trace_id": "86703c29-9184-6499-b3bc-ca3e48ea7c3c"
} | {
"account_age_days": 31,
"account_id": "ACCT-A436A5B156A7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.318
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 179,
"timestamp": "2026-01-07T12:05:00Z",
"transaction_amount_usd": 12853.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.658,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3378.06,
"financial_exposure_usd": 6275.05,
"recoverable_pct": 0.894
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102703",
"label": "fraudulent",
"label_confidence": 0.918,
"severity": "critical",
"timestamp": "2026-01-02T21:03:00Z",
"trace_id": "dcd57b73-c711-d671-85b4-fc71e3961fe3"
} | {
"account_age_days": 1929,
"account_id": "ACCT-50B3593B988B",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_2",
"session_entropy": 0.245
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 978,
"timestamp": "2026-01-02T21:03:00Z",
"transaction_amount_usd": 15688.58
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.433,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 299920.4,
"financial_exposure_usd": 491355.59,
"recoverable_pct": 0.028
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103836",
"label": "fraudulent",
"label_confidence": 0.649,
"severity": "medium",
"timestamp": "2026-01-03T15:56:00Z",
"trace_id": "a4965931-9b87-1aa9-940c-201f308ef847"
} | {
"account_age_days": 873,
"account_id": "ACCT-1E14EE76245F",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_2",
"session_entropy": 0.854
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1188,
"timestamp": "2026-01-03T15:56:00Z",
"transaction_amount_usd": 1074729.38
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.47,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4287735.48,
"financial_exposure_usd": 5291642.52,
"recoverable_pct": 0.722
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103249",
"label": "fraudulent",
"label_confidence": 0.768,
"severity": "medium",
"timestamp": "2026-01-03T06:09:00Z",
"trace_id": "e20be18d-2081-a385-5f4e-79dd66feace4"
} | {
"account_age_days": 1899,
"account_id": "ACCT-A90E9FF99109",
"baseline_risk_score": 0.319,
"kyc_tier": "tier_2",
"session_entropy": 0.566
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 652,
"timestamp": "2026-01-03T06:09:00Z",
"transaction_amount_usd": 92133.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.616,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 408049.79,
"financial_exposure_usd": 688050.42,
"recoverable_pct": 0.356
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108743",
"label": "benign",
"label_confidence": 0.597,
"severity": "high",
"timestamp": "2026-01-07T01:43:00Z",
"trace_id": "a374c28e-b67f-258d-2fb6-c33220fc593d"
} | {
"account_age_days": 1686,
"account_id": "ACCT-4C376AFDFE06",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.627
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 732,
"timestamp": "2026-01-07T01:43:00Z",
"transaction_amount_usd": 1254.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.77,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2853.58,
"financial_exposure_usd": 4839.57,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.