schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106014",
"label": "fraudulent",
"label_confidence": 0.917,
"severity": "critical",
"timestamp": "2026-01-05T04:14:00Z",
"trace_id": "a506578a-3ee6-8850-cb76-1289890e888b"
} | {
"account_age_days": 1850,
"account_id": "ACCT-E144644160FE",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.836
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 307,
"timestamp": "2026-01-04T17:28:00Z",
"transaction_amount_usd": 19.09
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.643,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3796407.91,
"financial_exposure_usd": 4778874.99,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108029",
"label": "benign",
"label_confidence": 0.721,
"severity": "low",
"timestamp": "2026-01-06T13:49:00Z",
"trace_id": "954622e4-21fe-5705-652c-be2cf5fce1ec"
} | {
"account_age_days": 1483,
"account_id": "ACCT-DDD49A091907",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.653
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1147,
"timestamp": "2026-01-06T13:49:00Z",
"transaction_amount_usd": 12626.59
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2067.7,
"financial_exposure_usd": 4060.71,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100560",
"label": "fraudulent",
"label_confidence": 0.959,
"severity": "critical",
"timestamp": "2026-01-01T09:20:00Z",
"trace_id": "64950116-c240-702d-b90b-cf5551b037db"
} | {
"account_age_days": 597,
"account_id": "ACCT-341117014E75",
"baseline_risk_score": 0.297,
"kyc_tier": "tier_1",
"session_entropy": 0.33
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 932,
"timestamp": "2026-01-01T09:20:00Z",
"transaction_amount_usd": 85358.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.396,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 236826.65,
"financial_exposure_usd": 392278.7,
"recoverable_pct": 0.756
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102292",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "high",
"timestamp": "2026-01-02T14:12:00Z",
"trace_id": "76310341-7881-26e3-f283-cbe101eb1ce2"
} | {
"account_age_days": 410,
"account_id": "ACCT-FC7360A3ADD2",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_2",
"session_entropy": 0.263
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 636,
"timestamp": "2026-01-02T14:12:00Z",
"transaction_amount_usd": 91902.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.382,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 508761.26,
"financial_exposure_usd": 646405.48,
"recoverable_pct": 0.035
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107286",
"label": "benign",
"label_confidence": 0.499,
"severity": "medium",
"timestamp": "2026-01-06T01:26:00Z",
"trace_id": "7a92535e-a7fc-65af-f1d6-05f842cc272e"
} | {
"account_age_days": 679,
"account_id": "ACCT-8F008B58BBF3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.166
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 515,
"timestamp": "2026-01-06T01:26:00Z",
"transaction_amount_usd": 3543.31
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4687.89,
"financial_exposure_usd": 5060.3,
"recoverable_pct": 0.627
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106321",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "high",
"timestamp": "2026-01-05T09:21:00Z",
"trace_id": "b1a6669a-e910-eb51-427a-883681aded06"
} | {
"account_age_days": 39,
"account_id": "ACCT-2B9B2A28A7F6",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_1",
"session_entropy": 0.272
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 266,
"timestamp": "2026-01-04T20:48:00Z",
"transaction_amount_usd": 10.52
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.79,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 5291611.8,
"financial_exposure_usd": 6014203.21,
"recoverable_pct": 0.72
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106616",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-05T14:16:00Z",
"trace_id": "7da44d29-54c6-058d-da94-c723c813dde7"
} | {
"account_age_days": 1332,
"account_id": "ACCT-66400E5EAC97",
"baseline_risk_score": 0.084,
"kyc_tier": "tier_3",
"session_entropy": 0.221
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 544,
"timestamp": "2026-01-05T14:16:00Z",
"transaction_amount_usd": 2535074.74
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.404,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5902991.78,
"financial_exposure_usd": 7470326.95,
"recoverable_pct": 0.448
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104717",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-04T06:37:00Z",
"trace_id": "28d9094e-8361-6f87-27e8-691f4846bf9b"
} | {
"account_age_days": 879,
"account_id": "ACCT-C3FD68065713",
"baseline_risk_score": 0.262,
"kyc_tier": "tier_2",
"session_entropy": 0.502
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 125,
"timestamp": "2026-01-04T06:37:00Z",
"transaction_amount_usd": 1569667.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.695,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2654584.31,
"financial_exposure_usd": 5823800.37,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102355",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "critical",
"timestamp": "2026-01-02T15:15:00Z",
"trace_id": "b96b7eb2-3e78-c6e1-7cbd-4d45cd822267"
} | {
"account_age_days": 311,
"account_id": "ACCT-F7FF367EAE94",
"baseline_risk_score": 0.503,
"kyc_tier": "tier_2",
"session_entropy": 0.174
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 849,
"timestamp": "2026-01-02T15:15:00Z",
"transaction_amount_usd": 112011.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.839,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 113726.81,
"financial_exposure_usd": 229045.98,
"recoverable_pct": 0.135
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108633",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-06T23:53:00Z",
"trace_id": "96e6ba8d-d2a4-e9c1-c7d1-f0c156873c76"
} | {
"account_age_days": 182,
"account_id": "ACCT-C390DB4DBDD4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.352
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 363,
"timestamp": "2026-01-06T23:53:00Z",
"transaction_amount_usd": 10795.92
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.462,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3949.08,
"financial_exposure_usd": 5883.88,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107550",
"label": "benign",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-06T05:50:00Z",
"trace_id": "148ea3ec-bcbf-ac9d-7781-6361cd23669c"
} | {
"account_age_days": 1624,
"account_id": "ACCT-FD7CD3B1B877",
"baseline_risk_score": 0.142,
"kyc_tier": "tier_1",
"session_entropy": 0.815
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 442,
"timestamp": "2026-01-06T05:50:00Z",
"transaction_amount_usd": 6745.2
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.494,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3783.34,
"financial_exposure_usd": 3796.5,
"recoverable_pct": 0.662
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103278",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "low",
"timestamp": "2026-01-03T06:38:00Z",
"trace_id": "8ebd9049-fa7a-4028-6e15-79669ed392d2"
} | {
"account_age_days": 596,
"account_id": "ACCT-F783EE09638B",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 249,
"timestamp": "2026-01-03T03:27:00Z",
"transaction_amount_usd": 10.91
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.924,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 573951.11,
"financial_exposure_usd": 849243.63,
"recoverable_pct": 0.723
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102453",
"label": "fraudulent",
"label_confidence": 0.855,
"severity": "medium",
"timestamp": "2026-01-02T16:53:00Z",
"trace_id": "5c47c41a-9b0a-2532-41e1-6d89ee984afa"
} | {
"account_age_days": 1791,
"account_id": "ACCT-FC8C569F27AE",
"baseline_risk_score": 0.586,
"kyc_tier": "tier_2",
"session_entropy": 0.823
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 213,
"timestamp": "2026-01-02T11:12:00Z",
"transaction_amount_usd": 8.33
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.43,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 509768.81,
"financial_exposure_usd": 745433.63,
"recoverable_pct": 0.479
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103661",
"label": "fraudulent",
"label_confidence": 0.848,
"severity": "critical",
"timestamp": "2026-01-03T13:01:00Z",
"trace_id": "67d429a9-d79b-2cf4-4d0d-d9d2b06983c2"
} | {
"account_age_days": 1674,
"account_id": "ACCT-800666E1E59F",
"baseline_risk_score": 0.148,
"kyc_tier": "tier_1",
"session_entropy": 0.108
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1197,
"timestamp": "2026-01-03T13:01:00Z",
"transaction_amount_usd": 760828.73
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.625,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5070909.28,
"financial_exposure_usd": 5173514.82,
"recoverable_pct": 0.679
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105779",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "critical",
"timestamp": "2026-01-05T00:19:00Z",
"trace_id": "06aef2fb-9cbd-f977-5b3d-562511ffa253"
} | {
"account_age_days": 319,
"account_id": "ACCT-1ACB258D088B",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_3",
"session_entropy": 0.854
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 260,
"timestamp": "2026-01-04T23:06:00Z",
"transaction_amount_usd": 11.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.723,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3058876.78,
"financial_exposure_usd": 3129986,
"recoverable_pct": 0.618
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105766",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "medium",
"timestamp": "2026-01-05T00:06:00Z",
"trace_id": "e601ebbb-5356-8038-fd80-d3a31d715e09"
} | {
"account_age_days": 18,
"account_id": "ACCT-C65EA7BC45F2",
"baseline_risk_score": 0.203,
"kyc_tier": "tier_1",
"session_entropy": 0.316
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 312,
"timestamp": "2026-01-04T16:07:00Z",
"transaction_amount_usd": 2.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2756171.85,
"financial_exposure_usd": 4136199.25,
"recoverable_pct": 0.582
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103374",
"label": "fraudulent",
"label_confidence": 0.658,
"severity": "medium",
"timestamp": "2026-01-03T08:14:00Z",
"trace_id": "75e9fcf2-d963-93df-ba5f-64e3c9e22060"
} | {
"account_age_days": 1260,
"account_id": "ACCT-4718A270E5B3",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.104
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 881,
"timestamp": "2026-01-03T08:14:00Z",
"transaction_amount_usd": 159526.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.927,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2858116.6,
"financial_exposure_usd": 3442655.49,
"recoverable_pct": 0.502
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101001",
"label": "fraudulent",
"label_confidence": 0.909,
"severity": "medium",
"timestamp": "2026-01-01T16:41:00Z",
"trace_id": "970283b3-5d5e-1495-312d-02d5546dde04"
} | {
"account_age_days": 1056,
"account_id": "ACCT-D17DD36F78D3",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_3",
"session_entropy": 0.568
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 224,
"timestamp": "2026-01-01T14:53:00Z",
"transaction_amount_usd": 10.71
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.647,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 619409.19,
"financial_exposure_usd": 734082.46,
"recoverable_pct": 0.585
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101191",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "critical",
"timestamp": "2026-01-01T19:51:00Z",
"trace_id": "5c0bee88-0d20-11e1-dc20-9f47be8e496f"
} | {
"account_age_days": 454,
"account_id": "ACCT-D733FD144444",
"baseline_risk_score": 0.263,
"kyc_tier": "tier_2",
"session_entropy": 0.249
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "JP",
"latency_ms": 847,
"timestamp": "2026-01-01T19:51:00Z",
"transaction_amount_usd": 113519.86
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.52,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 101594.24,
"financial_exposure_usd": 214976.79,
"recoverable_pct": 0.467
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100345",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "low",
"timestamp": "2026-01-01T05:45:00Z",
"trace_id": "7f07014d-0d44-b7c1-0342-73dd18d09c29"
} | {
"account_age_days": 1144,
"account_id": "ACCT-FA3A9FE008BB",
"baseline_risk_score": 0.553,
"kyc_tier": "tier_2",
"session_entropy": 0.881
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 938,
"timestamp": "2026-01-01T05:45:00Z",
"transaction_amount_usd": 77262.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.64,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 1111375.48,
"financial_exposure_usd": 1137995.27,
"recoverable_pct": 0.141
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106961",
"label": "benign",
"label_confidence": 0.491,
"severity": "low",
"timestamp": "2026-01-05T20:01:00Z",
"trace_id": "e8799d12-165b-59f5-2919-12b5719e0b5e"
} | {
"account_age_days": 941,
"account_id": "ACCT-0045B90CD5A3",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_1",
"session_entropy": 0.632
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 179,
"timestamp": "2026-01-05T20:01:00Z",
"transaction_amount_usd": 9842.93
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.591,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3443.91,
"financial_exposure_usd": 4227.24,
"recoverable_pct": 0.88
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109802",
"label": "benign",
"label_confidence": 0.587,
"severity": "medium",
"timestamp": "2026-01-07T19:22:00Z",
"trace_id": "9d739b3c-1104-fb80-6fe4-17d70d9afbdc"
} | {
"account_age_days": 189,
"account_id": "ACCT-73793029971D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.288
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 994,
"timestamp": "2026-01-07T19:22:00Z",
"transaction_amount_usd": 12512.92
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1425.52,
"financial_exposure_usd": 2326.89,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101480",
"label": "fraudulent",
"label_confidence": 0.956,
"severity": "medium",
"timestamp": "2026-01-02T00:40:00Z",
"trace_id": "310b1b3d-9178-a61a-e463-f70aee2185df"
} | {
"account_age_days": 1790,
"account_id": "ACCT-F8CBA42043ED",
"baseline_risk_score": 0.594,
"kyc_tier": "tier_2",
"session_entropy": 0.795
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 144,
"timestamp": "2026-01-02T00:40:00Z",
"transaction_amount_usd": 81696.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.866,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 298654.9,
"financial_exposure_usd": 692905.2,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100154",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "high",
"timestamp": "2026-01-01T02:34:00Z",
"trace_id": "82e847ae-f545-dfb3-08a4-7ee1e3b2f985"
} | {
"account_age_days": 1182,
"account_id": "ACCT-A4C755B00490",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_1",
"session_entropy": 0.766
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 141,
"timestamp": "2026-01-01T02:34:00Z",
"transaction_amount_usd": 35570.09
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.521,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 261225.6,
"financial_exposure_usd": 618717.56,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108168",
"label": "benign",
"label_confidence": 0.725,
"severity": "low",
"timestamp": "2026-01-06T16:08:00Z",
"trace_id": "193641b4-fd82-36a7-79f5-ce773d30b276"
} | {
"account_age_days": 1140,
"account_id": "ACCT-8FF58EF9A39E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.411
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 155,
"timestamp": "2026-01-06T11:59:00Z",
"transaction_amount_usd": 24.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.675,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3300.39,
"financial_exposure_usd": 4975.43,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102108",
"label": "fraudulent",
"label_confidence": 0.901,
"severity": "medium",
"timestamp": "2026-01-02T11:08:00Z",
"trace_id": "5db05831-57a2-a01f-296a-62ab5eadbfb5"
} | {
"account_age_days": 1454,
"account_id": "ACCT-36C203111307",
"baseline_risk_score": 0.279,
"kyc_tier": "tier_2",
"session_entropy": 0.535
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 349,
"timestamp": "2026-01-02T11:08:00Z",
"transaction_amount_usd": 30124.72
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.617,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1177537.1,
"financial_exposure_usd": 1213127.06,
"recoverable_pct": 0.724
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106301",
"label": "fraudulent",
"label_confidence": 0.654,
"severity": "medium",
"timestamp": "2026-01-05T09:01:00Z",
"trace_id": "ec007d37-a882-456c-c1cc-b6bdb0174feb"
} | {
"account_age_days": 1858,
"account_id": "ACCT-0F70E32A24F5",
"baseline_risk_score": 0.154,
"kyc_tier": "tier_1",
"session_entropy": 0.11
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 165,
"timestamp": "2026-01-05T09:01:00Z",
"transaction_amount_usd": 1156366.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.75,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 7782929.28,
"financial_exposure_usd": 9419508.74,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107313",
"label": "benign",
"label_confidence": 0.537,
"severity": "medium",
"timestamp": "2026-01-06T01:53:00Z",
"trace_id": "87561dd9-0ec4-4b52-0e11-39741339599f"
} | {
"account_age_days": 1857,
"account_id": "ACCT-5BAD4266A9E4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.886
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 117,
"timestamp": "2026-01-06T01:53:00Z",
"transaction_amount_usd": 5464.49
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.573,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1252.51,
"financial_exposure_usd": 1789.07,
"recoverable_pct": 0.62
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108079",
"label": "benign",
"label_confidence": 0.525,
"severity": "low",
"timestamp": "2026-01-06T14:39:00Z",
"trace_id": "71787248-ca06-ecda-ceaa-db4ecdecb204"
} | {
"account_age_days": 1194,
"account_id": "ACCT-6E96017F3E60",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.43
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 257,
"timestamp": "2026-01-06T04:12:00Z",
"transaction_amount_usd": 4.24
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.537,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3165.09,
"financial_exposure_usd": 7725.93,
"recoverable_pct": 0.464
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107270",
"label": "benign",
"label_confidence": 0.59,
"severity": "high",
"timestamp": "2026-01-06T01:10:00Z",
"trace_id": "59b91d8e-f9f2-2a5e-3201-e249db83a4a5"
} | {
"account_age_days": 1523,
"account_id": "ACCT-329B606C9989",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.601
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 1165,
"timestamp": "2026-01-06T01:10:00Z",
"transaction_amount_usd": 3293.01
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3419.23,
"financial_exposure_usd": 4677.45,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106068",
"label": "fraudulent",
"label_confidence": 0.748,
"severity": "critical",
"timestamp": "2026-01-05T05:08:00Z",
"trace_id": "43f9810f-7ae5-6661-27df-34fb38747712"
} | {
"account_age_days": 902,
"account_id": "ACCT-4208F3557CF1",
"baseline_risk_score": 0.272,
"kyc_tier": "tier_3",
"session_entropy": 0.542
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1183,
"timestamp": "2026-01-05T05:08:00Z",
"transaction_amount_usd": 1652176.25
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.709,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 851290.48,
"financial_exposure_usd": 905945.44,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100556",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "critical",
"timestamp": "2026-01-01T09:16:00Z",
"trace_id": "f9f34c61-7717-1798-1d12-b2e71d8243a1"
} | {
"account_age_days": 1954,
"account_id": "ACCT-6953C5868979",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_3",
"session_entropy": 0.726
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 96,
"timestamp": "2025-12-31T21:25:00Z",
"transaction_amount_usd": 3.52
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.458,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 533046.29,
"financial_exposure_usd": 888624.27,
"recoverable_pct": 0.431
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107982",
"label": "benign",
"label_confidence": 0.679,
"severity": "medium",
"timestamp": "2026-01-06T13:02:00Z",
"trace_id": "bf8420e3-4101-a1c8-ea0c-e559adb96e2a"
} | {
"account_age_days": 629,
"account_id": "ACCT-8B75636DDC8A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.432
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1110,
"timestamp": "2026-01-06T13:02:00Z",
"transaction_amount_usd": 13336.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.62,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1728.76,
"financial_exposure_usd": 3091.64,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106533",
"label": "fraudulent",
"label_confidence": 0.666,
"severity": "high",
"timestamp": "2026-01-05T12:53:00Z",
"trace_id": "bbd09759-a780-9891-1632-ccd981c9a8b8"
} | {
"account_age_days": 1353,
"account_id": "ACCT-83FB98873366",
"baseline_risk_score": 0.163,
"kyc_tier": "tier_1",
"session_entropy": 0.814
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 394,
"timestamp": "2026-01-05T05:14:00Z",
"transaction_amount_usd": 3.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.91,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2485978.69,
"financial_exposure_usd": 4412281.76,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105055",
"label": "fraudulent",
"label_confidence": 0.858,
"severity": "low",
"timestamp": "2026-01-04T12:15:00Z",
"trace_id": "6bafeebb-c5eb-9fd0-c7cd-75071ba5b9e1"
} | {
"account_age_days": 672,
"account_id": "ACCT-D950A9A8F829",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_2",
"session_entropy": 0.339
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 350,
"timestamp": "2026-01-04T09:45:00Z",
"transaction_amount_usd": 18.6
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.77,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 5306025.6,
"financial_exposure_usd": 8773197.13,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101744",
"label": "fraudulent",
"label_confidence": 0.811,
"severity": "high",
"timestamp": "2026-01-02T05:04:00Z",
"trace_id": "1a3d3e45-1af1-e1d5-0b8d-4fb819554bba"
} | {
"account_age_days": 1558,
"account_id": "ACCT-11FFEE87FA2C",
"baseline_risk_score": 0.42,
"kyc_tier": "tier_2",
"session_entropy": 0.21
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1176,
"timestamp": "2026-01-02T05:04:00Z",
"transaction_amount_usd": 2555.36
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.473,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 762861.96,
"financial_exposure_usd": 788001.78,
"recoverable_pct": 0.214
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103618",
"label": "fraudulent",
"label_confidence": 0.775,
"severity": "medium",
"timestamp": "2026-01-03T12:18:00Z",
"trace_id": "92926777-a2aa-9047-c47f-9339216b4ce4"
} | {
"account_age_days": 720,
"account_id": "ACCT-CFB2371E233B",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_3",
"session_entropy": 0.724
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 319,
"timestamp": "2026-01-03T12:18:00Z",
"transaction_amount_usd": 1286211.39
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.828,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5124307.06,
"financial_exposure_usd": 5776559.08,
"recoverable_pct": 0.644
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104458",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "medium",
"timestamp": "2026-01-04T02:18:00Z",
"trace_id": "deacaff3-44c4-b66e-b582-15e541c8db5f"
} | {
"account_age_days": 1057,
"account_id": "ACCT-6F18EA42015C",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.884
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 696,
"timestamp": "2026-01-04T02:18:00Z",
"transaction_amount_usd": 1781533
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.401,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 6102013.25,
"financial_exposure_usd": 7677178.85,
"recoverable_pct": 0.96
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100377",
"label": "fraudulent",
"label_confidence": 0.818,
"severity": "high",
"timestamp": "2026-01-01T06:17:00Z",
"trace_id": "48301db7-8810-a169-0257-ac68cfc47f87"
} | {
"account_age_days": 621,
"account_id": "ACCT-D447C810238A",
"baseline_risk_score": 0.29,
"kyc_tier": "tier_1",
"session_entropy": 0.211
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 96,
"timestamp": "2025-12-31T17:52:00Z",
"transaction_amount_usd": 7.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"ge... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.628,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 467567.34,
"financial_exposure_usd": 495775.2,
"recoverable_pct": 0.305
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104988",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "low",
"timestamp": "2026-01-04T11:08:00Z",
"trace_id": "86bca794-3cad-06fa-8971-d2333134b170"
} | {
"account_age_days": 1235,
"account_id": "ACCT-5E73C6CC881F",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_3",
"session_entropy": 0.391
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 281,
"timestamp": "2026-01-04T00:16:00Z",
"transaction_amount_usd": 8.21
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.865,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1230504.99,
"financial_exposure_usd": 2751144.07,
"recoverable_pct": 0.731
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100548",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "critical",
"timestamp": "2026-01-01T09:08:00Z",
"trace_id": "3048c863-49b7-0422-27d9-429a859ccbca"
} | {
"account_age_days": 729,
"account_id": "ACCT-387A0203A4A0",
"baseline_risk_score": 0.302,
"kyc_tier": "tier_2",
"session_entropy": 0.516
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 109,
"timestamp": "2026-01-01T09:08:00Z",
"transaction_amount_usd": 39102.4
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 451216.05,
"financial_exposure_usd": 681037.01,
"recoverable_pct": 0.377
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109130",
"label": "benign",
"label_confidence": 0.663,
"severity": "medium",
"timestamp": "2026-01-07T08:10:00Z",
"trace_id": "aed8787b-51c1-bede-e06a-5869226c1333"
} | {
"account_age_days": 391,
"account_id": "ACCT-330536739437",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_3",
"session_entropy": 0.457
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 128,
"timestamp": "2026-01-06T21:08:00Z",
"transaction_amount_usd": 20.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3616.83,
"financial_exposure_usd": 3703.15,
"recoverable_pct": 0.93
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100571",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "critical",
"timestamp": "2026-01-01T09:31:00Z",
"trace_id": "63490196-e09a-5dea-b320-c670c282fd05"
} | {
"account_age_days": 857,
"account_id": "ACCT-69C94FC00317",
"baseline_risk_score": 0.252,
"kyc_tier": "tier_2",
"session_entropy": 0.26
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 916,
"timestamp": "2026-01-01T09:31:00Z",
"transaction_amount_usd": 36848.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.735,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 453556.24,
"financial_exposure_usd": 653351.66,
"recoverable_pct": 0.318
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104147",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "low",
"timestamp": "2026-01-03T21:07:00Z",
"trace_id": "677e7a37-4e00-8888-f5a9-f4b2943be47b"
} | {
"account_age_days": 586,
"account_id": "ACCT-55C0491893AE",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_1",
"session_entropy": 0.913
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 540,
"timestamp": "2026-01-03T21:07:00Z",
"transaction_amount_usd": 528407.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.378,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2396004.19,
"financial_exposure_usd": 3540789.44,
"recoverable_pct": 0.613
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107832",
"label": "benign",
"label_confidence": 0.488,
"severity": "high",
"timestamp": "2026-01-06T10:32:00Z",
"trace_id": "35c5ed13-ef72-d76f-9e61-554f5d1e4749"
} | {
"account_age_days": 899,
"account_id": "ACCT-E1C4C27AE094",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.256
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 952,
"timestamp": "2026-01-06T10:32:00Z",
"transaction_amount_usd": 2671.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.506,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1559.94,
"financial_exposure_usd": 2983.41,
"recoverable_pct": 0.472
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109972",
"label": "benign",
"label_confidence": 0.513,
"severity": "high",
"timestamp": "2026-01-07T22:12:00Z",
"trace_id": "8940c7ad-d1dd-1437-47da-0138fd121e7f"
} | {
"account_age_days": 1661,
"account_id": "ACCT-68BCBF64F0B5",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.894
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 224,
"timestamp": "2026-01-07T22:12:00Z",
"transaction_amount_usd": 4562.01
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 35.46,
"financial_exposure_usd": 80.17,
"recoverable_pct": 0.605
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106891",
"label": "benign",
"label_confidence": 0.643,
"severity": "medium",
"timestamp": "2026-01-05T18:51:00Z",
"trace_id": "6e4bac8b-f5e7-7c1d-c47c-e9d9e3581134"
} | {
"account_age_days": 209,
"account_id": "ACCT-4ECC55B6C14F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.777
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 259,
"timestamp": "2026-01-05T17:41:00Z",
"transaction_amount_usd": 19.07
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 5971.07,
"financial_exposure_usd": 6949.17,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102995",
"label": "fraudulent",
"label_confidence": 0.887,
"severity": "low",
"timestamp": "2026-01-03T01:55:00Z",
"trace_id": "083c9d2e-9a3f-b957-9c10-efd47447fbb0"
} | {
"account_age_days": 1009,
"account_id": "ACCT-68695F071550",
"baseline_risk_score": 0.378,
"kyc_tier": "tier_2",
"session_entropy": 0.573
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 1022,
"timestamp": "2026-01-03T01:55:00Z",
"transaction_amount_usd": 34594.17
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.708,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 696311.92,
"financial_exposure_usd": 897872.06,
"recoverable_pct": 0.822
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100652",
"label": "fraudulent",
"label_confidence": 0.849,
"severity": "medium",
"timestamp": "2026-01-01T10:52:00Z",
"trace_id": "ea1f506a-af91-90b2-ac77-e0b36e59ac18"
} | {
"account_age_days": 581,
"account_id": "ACCT-B1776A337FB7",
"baseline_risk_score": 0.433,
"kyc_tier": "tier_3",
"session_entropy": 0.647
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 120,
"timestamp": "2026-01-01T03:50:00Z",
"transaction_amount_usd": 22.22
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 133568.01,
"financial_exposure_usd": 138289.92,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108157",
"label": "benign",
"label_confidence": 0.516,
"severity": "low",
"timestamp": "2026-01-06T15:57:00Z",
"trace_id": "751311e9-7d92-36a3-788d-bf682b8fb4d1"
} | {
"account_age_days": 1336,
"account_id": "ACCT-669F00113EF8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.508
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 160,
"timestamp": "2026-01-06T03:57:00Z",
"transaction_amount_usd": 23.98
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.478,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6628.7,
"financial_exposure_usd": 8864.53,
"recoverable_pct": 0.993
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101828",
"label": "fraudulent",
"label_confidence": 0.865,
"severity": "high",
"timestamp": "2026-01-02T06:28:00Z",
"trace_id": "9544e45e-cfd0-4327-b492-7dc5b1c7457d"
} | {
"account_age_days": 1703,
"account_id": "ACCT-882AA220AA85",
"baseline_risk_score": 0.338,
"kyc_tier": "tier_3",
"session_entropy": 0.302
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 889,
"timestamp": "2026-01-02T06:28:00Z",
"transaction_amount_usd": 109995.59
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.525,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 546389.71,
"financial_exposure_usd": 863070.81,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100801",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "high",
"timestamp": "2026-01-01T13:21:00Z",
"trace_id": "a4167ce7-1054-f70c-5377-460027d60738"
} | {
"account_age_days": 1414,
"account_id": "ACCT-313A1AA3DB6C",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_1",
"session_entropy": 0.897
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 314,
"timestamp": "2026-01-01T04:17:00Z",
"transaction_amount_usd": 6.77
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.454,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 503877.13,
"financial_exposure_usd": 824429.05,
"recoverable_pct": 0.417
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101301",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "critical",
"timestamp": "2026-01-01T21:41:00Z",
"trace_id": "21eccbba-cf14-baf6-b4af-9db74246c122"
} | {
"account_age_days": 1320,
"account_id": "ACCT-1EA2EB73D266",
"baseline_risk_score": 0.438,
"kyc_tier": "tier_3",
"session_entropy": 0.297
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 904,
"timestamp": "2026-01-01T21:41:00Z",
"transaction_amount_usd": 76701.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.755,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 202087.5,
"financial_exposure_usd": 411430.33,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106905",
"label": "benign",
"label_confidence": 0.492,
"severity": "medium",
"timestamp": "2026-01-05T19:05:00Z",
"trace_id": "320ea319-34b3-a9a1-b9cf-7315c246fb5f"
} | {
"account_age_days": 1559,
"account_id": "ACCT-02A88739D12C",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_2",
"session_entropy": 0.22
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 205,
"timestamp": "2026-01-05T12:14:00Z",
"transaction_amount_usd": 1.19
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2703.16,
"financial_exposure_usd": 2778.25,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109442",
"label": "benign",
"label_confidence": 0.659,
"severity": "medium",
"timestamp": "2026-01-07T13:22:00Z",
"trace_id": "8d07149d-5ab2-7635-9535-3d9e65975007"
} | {
"account_age_days": 1904,
"account_id": "ACCT-E109D7DBB40E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.1
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 801,
"timestamp": "2026-01-07T13:22:00Z",
"transaction_amount_usd": 3316.4
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.672,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 494.3,
"financial_exposure_usd": 1167.5,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105291",
"label": "fraudulent",
"label_confidence": 0.642,
"severity": "low",
"timestamp": "2026-01-04T16:11:00Z",
"trace_id": "50e0871d-ec57-db74-afb3-28f64b43e3f0"
} | {
"account_age_days": 1688,
"account_id": "ACCT-21537907F04A",
"baseline_risk_score": 0.326,
"kyc_tier": "tier_3",
"session_entropy": 0.158
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 543,
"timestamp": "2026-01-04T16:11:00Z",
"transaction_amount_usd": 1156196.07
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.667,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1750834.04,
"financial_exposure_usd": 2786980.05,
"recoverable_pct": 0.735
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101648",
"label": "fraudulent",
"label_confidence": 0.929,
"severity": "critical",
"timestamp": "2026-01-02T03:28:00Z",
"trace_id": "6549ee9c-fb47-df35-9e2b-79d03378cd50"
} | {
"account_age_days": 1570,
"account_id": "ACCT-059711C6E066",
"baseline_risk_score": 0.349,
"kyc_tier": "tier_2",
"session_entropy": 0.411
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 897,
"timestamp": "2026-01-02T03:28:00Z",
"transaction_amount_usd": 97668.72
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.877,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 495557.44,
"financial_exposure_usd": 804705.44,
"recoverable_pct": 0.041
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106637",
"label": "fraudulent",
"label_confidence": 0.859,
"severity": "medium",
"timestamp": "2026-01-05T14:37:00Z",
"trace_id": "c57aad57-d715-8d12-b012-2fd08405446c"
} | {
"account_age_days": 1480,
"account_id": "ACCT-A2F1348B69A5",
"baseline_risk_score": 0.186,
"kyc_tier": "tier_3",
"session_entropy": 0.477
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 323,
"timestamp": "2026-01-05T03:32:00Z",
"transaction_amount_usd": 7.93
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.888,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3118213.78,
"financial_exposure_usd": 4060257.63,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104905",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "low",
"timestamp": "2026-01-04T09:45:00Z",
"trace_id": "39c752d6-9e6d-4fbb-fe7c-9a46c5df2e53"
} | {
"account_age_days": 437,
"account_id": "ACCT-85174F75A336",
"baseline_risk_score": 0.308,
"kyc_tier": "tier_2",
"session_entropy": 0.815
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 1042,
"timestamp": "2026-01-04T09:45:00Z",
"transaction_amount_usd": 695646.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.725,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2075485.27,
"financial_exposure_usd": 4574820.12,
"recoverable_pct": 0.841
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109596",
"label": "benign",
"label_confidence": 0.724,
"severity": "medium",
"timestamp": "2026-01-07T15:56:00Z",
"trace_id": "1bf042e8-8ff3-1d26-fb0c-7371a02a9175"
} | {
"account_age_days": 431,
"account_id": "ACCT-86E29C06D609",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.598
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 307,
"timestamp": "2026-01-07T15:56:00Z",
"transaction_amount_usd": 13499.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1960.64,
"financial_exposure_usd": 2756.16,
"recoverable_pct": 0.938
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106094",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "high",
"timestamp": "2026-01-05T05:34:00Z",
"trace_id": "ec927ddc-5a89-ce82-d00c-6700e085a2de"
} | {
"account_age_days": 1487,
"account_id": "ACCT-7D6249C642D5",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.672
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 766,
"timestamp": "2026-01-05T05:34:00Z",
"transaction_amount_usd": 583470.68
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.908,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3600238,
"financial_exposure_usd": 5906812.38,
"recoverable_pct": 0.982
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109465",
"label": "benign",
"label_confidence": 0.52,
"severity": "low",
"timestamp": "2026-01-07T13:45:00Z",
"trace_id": "c2962597-b398-4fcf-83f8-9811ad4347e7"
} | {
"account_age_days": 1267,
"account_id": "ACCT-78DB7F1FDD2F",
"baseline_risk_score": 0.132,
"kyc_tier": "tier_3",
"session_entropy": 0.801
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 268,
"timestamp": "2026-01-07T04:45:00Z",
"transaction_amount_usd": 10.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.601,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3205.92,
"financial_exposure_usd": 3237.95,
"recoverable_pct": 0.968
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101201",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "medium",
"timestamp": "2026-01-01T20:01:00Z",
"trace_id": "8c143cd5-ad7d-5ee2-1126-a4ac955ee1ad"
} | {
"account_age_days": 604,
"account_id": "ACCT-534F9E00BDD6",
"baseline_risk_score": 0.325,
"kyc_tier": "tier_2",
"session_entropy": 0.594
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 162,
"timestamp": "2026-01-01T09:35:00Z",
"transaction_amount_usd": 22.21
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1027458.96,
"financial_exposure_usd": 1043736.73,
"recoverable_pct": 0.22
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102988",
"label": "fraudulent",
"label_confidence": 0.799,
"severity": "high",
"timestamp": "2026-01-03T01:48:00Z",
"trace_id": "6b9f8e6a-7cf3-8091-ff9b-742a1da0612e"
} | {
"account_age_days": 841,
"account_id": "ACCT-5753BF1A7855",
"baseline_risk_score": 0.573,
"kyc_tier": "tier_1",
"session_entropy": 0.855
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 154,
"timestamp": "2026-01-02T18:53:00Z",
"transaction_amount_usd": 24.88
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.768,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 94791.74,
"financial_exposure_usd": 216138.06,
"recoverable_pct": 0.236
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102527",
"label": "fraudulent",
"label_confidence": 0.845,
"severity": "medium",
"timestamp": "2026-01-02T18:07:00Z",
"trace_id": "f0918e2b-08ad-561f-8da1-c912e6163145"
} | {
"account_age_days": 345,
"account_id": "ACCT-3B7467BFE8C6",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_3",
"session_entropy": 0.932
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 378,
"timestamp": "2026-01-02T18:07:00Z",
"transaction_amount_usd": 48071.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1159281.63,
"financial_exposure_usd": 1250478.12,
"recoverable_pct": 0.394
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103789",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "critical",
"timestamp": "2026-01-03T15:09:00Z",
"trace_id": "9fb49c91-fade-e822-92f8-f0ffae982cf4"
} | {
"account_age_days": 1269,
"account_id": "ACCT-015FDF939D59",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.282
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 754,
"timestamp": "2026-01-03T15:09:00Z",
"transaction_amount_usd": 1041935.83
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.525,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 866409.47,
"financial_exposure_usd": 1130771.08,
"recoverable_pct": 0.905
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103333",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-03T07:33:00Z",
"trace_id": "de4e8a6e-6929-d30d-cd98-83d2d36dcc21"
} | {
"account_age_days": 1787,
"account_id": "ACCT-009E559EB51C",
"baseline_risk_score": 0.629,
"kyc_tier": "tier_1",
"session_entropy": 0.439
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 385,
"timestamp": "2026-01-03T06:45:00Z",
"transaction_amount_usd": 20
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.578,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 345957.29,
"financial_exposure_usd": 544018.17,
"recoverable_pct": 0.706
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102889",
"label": "fraudulent",
"label_confidence": 0.951,
"severity": "critical",
"timestamp": "2026-01-03T00:09:00Z",
"trace_id": "3cc99fff-ce3b-8003-a57c-624a85d3a904"
} | {
"account_age_days": 15,
"account_id": "ACCT-B2D021A23FE3",
"baseline_risk_score": 0.522,
"kyc_tier": "tier_3",
"session_entropy": 0.499
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 134,
"timestamp": "2026-01-03T00:09:00Z",
"transaction_amount_usd": 61106.31
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.626,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 535225.78,
"financial_exposure_usd": 1269985.67,
"recoverable_pct": 0.114
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102365",
"label": "fraudulent",
"label_confidence": 0.908,
"severity": "critical",
"timestamp": "2026-01-02T15:25:00Z",
"trace_id": "f2993ba1-d1ac-2331-3d28-05bb3ca19dbc"
} | {
"account_age_days": 364,
"account_id": "ACCT-8898020C3551",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_1",
"session_entropy": 0.807
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 322,
"timestamp": "2026-01-02T11:38:00Z",
"transaction_amount_usd": 17.84
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.422,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 408834.37,
"financial_exposure_usd": 943805.53,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108120",
"label": "benign",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-06T15:20:00Z",
"trace_id": "557b2c0e-8123-7afc-46bd-224050205b1f"
} | {
"account_age_days": 1799,
"account_id": "ACCT-0959FEA537CF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.466
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 224,
"timestamp": "2026-01-06T11:26:00Z",
"transaction_amount_usd": 11.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.455,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1342.26,
"financial_exposure_usd": 2666.25,
"recoverable_pct": 0.667
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102592",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "medium",
"timestamp": "2026-01-02T19:12:00Z",
"trace_id": "5f07bd8b-cfe9-ecac-d9e1-30e9b9a96a6c"
} | {
"account_age_days": 1761,
"account_id": "ACCT-4F1847C00D4A",
"baseline_risk_score": 0.458,
"kyc_tier": "tier_1",
"session_entropy": 0.66
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 514,
"timestamp": "2026-01-02T19:12:00Z",
"transaction_amount_usd": 31463.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.793,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 147947.3,
"financial_exposure_usd": 291159.07,
"recoverable_pct": 0.806
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107658",
"label": "benign",
"label_confidence": 0.458,
"severity": "low",
"timestamp": "2026-01-06T07:38:00Z",
"trace_id": "83ede7bc-49f7-da34-f9a0-4206c459df58"
} | {
"account_age_days": 479,
"account_id": "ACCT-56663DB4BF80",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_2",
"session_entropy": 0.533
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 789,
"timestamp": "2026-01-06T07:38:00Z",
"transaction_amount_usd": 4879.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.652,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3411.67,
"financial_exposure_usd": 5379.49,
"recoverable_pct": 0.46
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109556",
"label": "benign",
"label_confidence": 0.545,
"severity": "medium",
"timestamp": "2026-01-07T15:16:00Z",
"trace_id": "e2cd83b8-2a45-34f3-d9be-fb738d882c5a"
} | {
"account_age_days": 53,
"account_id": "ACCT-197359B69A53",
"baseline_risk_score": 0.128,
"kyc_tier": "tier_3",
"session_entropy": 0.789
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 115,
"timestamp": "2026-01-07T14:37:00Z",
"transaction_amount_usd": 17.44
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.631,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 321.53,
"financial_exposure_usd": 610.21,
"recoverable_pct": 0.513
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109951",
"label": "benign",
"label_confidence": 0.567,
"severity": "medium",
"timestamp": "2026-01-07T21:51:00Z",
"trace_id": "15dcbba2-9fcb-4d1f-4532-f75c05517a5e"
} | {
"account_age_days": 1161,
"account_id": "ACCT-BB45F58545AF",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.261
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 789,
"timestamp": "2026-01-07T21:51:00Z",
"transaction_amount_usd": 5355.81
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4285.06,
"financial_exposure_usd": 4936.51,
"recoverable_pct": 0.882
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105027",
"label": "fraudulent",
"label_confidence": 0.912,
"severity": "low",
"timestamp": "2026-01-04T11:47:00Z",
"trace_id": "20ba6968-d396-5f30-aab2-e304ae254daf"
} | {
"account_age_days": 789,
"account_id": "ACCT-EC0F06256A7D",
"baseline_risk_score": 0.306,
"kyc_tier": "tier_1",
"session_entropy": 0.523
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 608,
"timestamp": "2026-01-04T11:47:00Z",
"transaction_amount_usd": 368122.16
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.497,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1685933.26,
"financial_exposure_usd": 2613122.65,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107727",
"label": "benign",
"label_confidence": 0.634,
"severity": "low",
"timestamp": "2026-01-06T08:47:00Z",
"trace_id": "a10e4050-a4a4-20e9-306d-4b4cae87d3c4"
} | {
"account_age_days": 1822,
"account_id": "ACCT-8AAE6A9CCEA8",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.348
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 232,
"timestamp": "2026-01-06T08:47:00Z",
"transaction_amount_usd": 6630.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 2021.55,
"financial_exposure_usd": 2416.96,
"recoverable_pct": 0.671
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101029",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "critical",
"timestamp": "2026-01-01T17:09:00Z",
"trace_id": "1122439d-7018-fa03-b339-01c0e466df1c"
} | {
"account_age_days": 707,
"account_id": "ACCT-9607B8A06270",
"baseline_risk_score": 0.618,
"kyc_tier": "tier_1",
"session_entropy": 0.514
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 754,
"timestamp": "2026-01-01T17:09:00Z",
"transaction_amount_usd": 118967.41
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.603,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 109514.44,
"financial_exposure_usd": 143303.78,
"recoverable_pct": 0.765
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105237",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "critical",
"timestamp": "2026-01-04T15:17:00Z",
"trace_id": "e4b32951-9243-3664-71b8-236d76e7ab58"
} | {
"account_age_days": 64,
"account_id": "ACCT-FDA09A22E37D",
"baseline_risk_score": 0.354,
"kyc_tier": "tier_1",
"session_entropy": 0.288
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 1197,
"timestamp": "2026-01-04T15:17:00Z",
"transaction_amount_usd": 1546950.52
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.67,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3726349.2,
"financial_exposure_usd": 7809514.03,
"recoverable_pct": 0.994
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102873",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "medium",
"timestamp": "2026-01-02T23:53:00Z",
"trace_id": "abba8794-1bf1-dbaa-704e-a49aad30ca09"
} | {
"account_age_days": 1866,
"account_id": "ACCT-001B0ADDDA34",
"baseline_risk_score": 0.285,
"kyc_tier": "tier_3",
"session_entropy": 0.927
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 1088,
"timestamp": "2026-01-02T23:53:00Z",
"transaction_amount_usd": 108604.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.748,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1050206.19,
"financial_exposure_usd": 1148934.23,
"recoverable_pct": 0.308
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107607",
"label": "benign",
"label_confidence": 0.465,
"severity": "low",
"timestamp": "2026-01-06T06:47:00Z",
"trace_id": "70d764d4-b92c-71d6-a7a2-a7f28b221c42"
} | {
"account_age_days": 1485,
"account_id": "ACCT-A14F4A70E92E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.797
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 988,
"timestamp": "2026-01-06T06:47:00Z",
"transaction_amount_usd": 11989.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.75,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tr... | {
"customer_funds_at_risk_usd": 1434.87,
"financial_exposure_usd": 3324.5,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108176",
"label": "benign",
"label_confidence": 0.66,
"severity": "low",
"timestamp": "2026-01-06T16:16:00Z",
"trace_id": "e9bd9f14-95c3-166e-b729-761d0ce365c2"
} | {
"account_age_days": 214,
"account_id": "ACCT-0603B1994C0A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.308
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 167,
"timestamp": "2026-01-06T14:08:00Z",
"transaction_amount_usd": 11.1
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.538,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3925.09,
"financial_exposure_usd": 8790.75,
"recoverable_pct": 0.834
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102865",
"label": "fraudulent",
"label_confidence": 0.781,
"severity": "medium",
"timestamp": "2026-01-02T23:45:00Z",
"trace_id": "2ba1d6b2-3f4c-ba26-22d0-a536294063e0"
} | {
"account_age_days": 765,
"account_id": "ACCT-9EADCBB2064B",
"baseline_risk_score": 0.283,
"kyc_tier": "tier_3",
"session_entropy": 0.839
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 809,
"timestamp": "2026-01-02T23:45:00Z",
"transaction_amount_usd": 107288.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.797,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 406907.18,
"financial_exposure_usd": 655677.24,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107223",
"label": "benign",
"label_confidence": 0.485,
"severity": "medium",
"timestamp": "2026-01-06T00:23:00Z",
"trace_id": "50d6f0ab-b0f7-f7bf-6a00-81dfebf157d2"
} | {
"account_age_days": 1272,
"account_id": "ACCT-8793BC322F36",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_2",
"session_entropy": 0.234
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 1067,
"timestamp": "2026-01-06T00:23:00Z",
"transaction_amount_usd": 6808.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.716,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1302.72,
"financial_exposure_usd": 2284.64,
"recoverable_pct": 0.99
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106413",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "high",
"timestamp": "2026-01-05T10:53:00Z",
"trace_id": "a42f5865-fc7b-e70d-9613-6e2e8bb64b80"
} | {
"account_age_days": 170,
"account_id": "ACCT-3A0DF58F9D0F",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_3",
"session_entropy": 0.216
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 632,
"timestamp": "2026-01-05T10:53:00Z",
"transaction_amount_usd": 983933.17
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.717,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4831118.18,
"financial_exposure_usd": 6834672.11,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107175",
"label": "benign",
"label_confidence": 0.519,
"severity": "high",
"timestamp": "2026-01-05T23:35:00Z",
"trace_id": "63577d9c-2d0f-f277-2e21-59d686fd0ab6"
} | {
"account_age_days": 1973,
"account_id": "ACCT-FFF5415389DA",
"baseline_risk_score": 0.09,
"kyc_tier": "tier_2",
"session_entropy": 0.668
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1164,
"timestamp": "2026-01-05T23:35:00Z",
"transaction_amount_usd": 12752.56
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.738,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1474.6,
"financial_exposure_usd": 2439.77,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101987",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "medium",
"timestamp": "2026-01-02T09:07:00Z",
"trace_id": "4bc6c3cf-ec40-0e1a-8b67-3c50852a27ac"
} | {
"account_age_days": 306,
"account_id": "ACCT-4548F881E41D",
"baseline_risk_score": 0.379,
"kyc_tier": "tier_3",
"session_entropy": 0.262
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 316,
"timestamp": "2026-01-02T09:07:00Z",
"transaction_amount_usd": 59558.46
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.797,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 828869.95,
"financial_exposure_usd": 848366,
"recoverable_pct": 0.687
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108882",
"label": "benign",
"label_confidence": 0.522,
"severity": "critical",
"timestamp": "2026-01-07T04:02:00Z",
"trace_id": "5633185e-30a3-7c2b-1ac2-3bd89e6c9d58"
} | {
"account_age_days": 1251,
"account_id": "ACCT-F841CA62C642",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.948
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 326,
"timestamp": "2026-01-07T04:02:00Z",
"transaction_amount_usd": 10458.48
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.528,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4484.85,
"financial_exposure_usd": 4993.17,
"recoverable_pct": 0.808
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108154",
"label": "benign",
"label_confidence": 0.496,
"severity": "low",
"timestamp": "2026-01-06T15:54:00Z",
"trace_id": "a584bee5-db91-1e4f-849e-ba9b79d68282"
} | {
"account_age_days": 1048,
"account_id": "ACCT-070715FD2D26",
"baseline_risk_score": 0.085,
"kyc_tier": "tier_1",
"session_entropy": 0.607
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 237,
"timestamp": "2026-01-06T08:12:00Z",
"transaction_amount_usd": 6.78
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.526,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 382.76,
"financial_exposure_usd": 835.06,
"recoverable_pct": 0.515
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101711",
"label": "fraudulent",
"label_confidence": 0.797,
"severity": "critical",
"timestamp": "2026-01-02T04:31:00Z",
"trace_id": "dcd3a0b8-789e-435b-1100-f2e82740dcf4"
} | {
"account_age_days": 832,
"account_id": "ACCT-BCF2D6AF41D2",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_3",
"session_entropy": 0.185
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1163,
"timestamp": "2026-01-02T04:31:00Z",
"transaction_amount_usd": 22978.33
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.39,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 1080231.37,
"financial_exposure_usd": 1216524.89,
"recoverable_pct": 0.203
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108048",
"label": "benign",
"label_confidence": 0.657,
"severity": "medium",
"timestamp": "2026-01-06T14:08:00Z",
"trace_id": "df67f5d3-cae6-c5bc-9b71-964f28d984e1"
} | {
"account_age_days": 603,
"account_id": "ACCT-96DD26F33646",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.263
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 131,
"timestamp": "2026-01-06T14:08:00Z",
"transaction_amount_usd": 5697.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.587,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3874.91,
"financial_exposure_usd": 6624.01,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103654",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "medium",
"timestamp": "2026-01-03T12:54:00Z",
"trace_id": "9997db65-e965-091c-fc6a-b7f69030c123"
} | {
"account_age_days": 1717,
"account_id": "ACCT-80EB7D695D2E",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_3",
"session_entropy": 0.684
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 334,
"timestamp": "2026-01-03T05:49:00Z",
"transaction_amount_usd": 15.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.398,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 9",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 432005.41,
"financial_exposure_usd": 1007776.07,
"recoverable_pct": 0.817
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102398",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "critical",
"timestamp": "2026-01-02T15:58:00Z",
"trace_id": "761c6ca7-16f1-d7e0-c3cb-9f79462678db"
} | {
"account_age_days": 1914,
"account_id": "ACCT-7BB762EDD3F0",
"baseline_risk_score": 0.444,
"kyc_tier": "tier_2",
"session_entropy": 0.449
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 492,
"timestamp": "2026-01-02T15:58:00Z",
"transaction_amount_usd": 118220.9
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.749,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 857040.02,
"financial_exposure_usd": 988474.36,
"recoverable_pct": 0.002
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105305",
"label": "fraudulent",
"label_confidence": 0.711,
"severity": "low",
"timestamp": "2026-01-04T16:25:00Z",
"trace_id": "45b5da5b-1ce1-0360-2dfa-0d25dcb743e6"
} | {
"account_age_days": 1919,
"account_id": "ACCT-100462DB3EC4",
"baseline_risk_score": 0.374,
"kyc_tier": "tier_2",
"session_entropy": 0.478
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 508,
"timestamp": "2026-01-04T16:25:00Z",
"transaction_amount_usd": 1269523.24
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.656,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 218657.91,
"financial_exposure_usd": 336747.23,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104016",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "medium",
"timestamp": "2026-01-03T18:56:00Z",
"trace_id": "0d1672c2-1516-2674-f343-432a44b3f6a2"
} | {
"account_age_days": 151,
"account_id": "ACCT-011D0D06D93D",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_2",
"session_entropy": 0.875
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1163,
"timestamp": "2026-01-03T18:56:00Z",
"transaction_amount_usd": 533195.01
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.919,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2848178.09,
"financial_exposure_usd": 5725211.69,
"recoverable_pct": 0.943
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104370",
"label": "fraudulent",
"label_confidence": 0.713,
"severity": "medium",
"timestamp": "2026-01-04T00:50:00Z",
"trace_id": "dcc561d1-1130-bd03-52c9-36e67e8796f2"
} | {
"account_age_days": 1225,
"account_id": "ACCT-A43926426BE7",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.346
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 1066,
"timestamp": "2026-01-04T00:50:00Z",
"transaction_amount_usd": 1592253.23
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.725,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 141586.32,
"financial_exposure_usd": 315209.84,
"recoverable_pct": 0.862
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105950",
"label": "fraudulent",
"label_confidence": 0.624,
"severity": "medium",
"timestamp": "2026-01-05T03:10:00Z",
"trace_id": "99766827-e11e-2629-f8c3-678eaebd318b"
} | {
"account_age_days": 654,
"account_id": "ACCT-08F0A7C3BC91",
"baseline_risk_score": 0.069,
"kyc_tier": "tier_2",
"session_entropy": 0.25
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 214,
"timestamp": "2026-01-04T22:16:00Z",
"transaction_amount_usd": 3.98
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.861,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3763554.79,
"financial_exposure_usd": 4538012.19,
"recoverable_pct": 0.74
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103210",
"label": "fraudulent",
"label_confidence": 0.871,
"severity": "medium",
"timestamp": "2026-01-03T05:30:00Z",
"trace_id": "25943a8f-c1e0-6079-1dbc-26e82c72af5a"
} | {
"account_age_days": 904,
"account_id": "ACCT-244229824645",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_2",
"session_entropy": 0.262
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "GB",
"latency_ms": 704,
"timestamp": "2026-01-03T05:30:00Z",
"transaction_amount_usd": 77517.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.527,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 274959.8,
"financial_exposure_usd": 379423.39,
"recoverable_pct": 0.063
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103330",
"label": "fraudulent",
"label_confidence": 0.784,
"severity": "high",
"timestamp": "2026-01-03T07:30:00Z",
"trace_id": "e090dfa7-b44d-0a3d-a0d1-0aeb8b90b62c"
} | {
"account_age_days": 1586,
"account_id": "ACCT-0ED20D9FAA1E",
"baseline_risk_score": 0.551,
"kyc_tier": "tier_1",
"session_entropy": 0.602
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 344,
"timestamp": "2026-01-03T07:30:00Z",
"transaction_amount_usd": 98554.83
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.751,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 740765.38,
"financial_exposure_usd": 803554.23,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103819",
"label": "fraudulent",
"label_confidence": 0.907,
"severity": "medium",
"timestamp": "2026-01-03T15:39:00Z",
"trace_id": "6136202e-567e-9e68-ae1c-eaa941f0f33e"
} | {
"account_age_days": 553,
"account_id": "ACCT-48F3928B3950",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_2",
"session_entropy": 0.388
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 598,
"timestamp": "2026-01-03T15:39:00Z",
"transaction_amount_usd": 588736.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.872,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1226412.88,
"financial_exposure_usd": 2505332.45,
"recoverable_pct": 0.491
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103445",
"label": "fraudulent",
"label_confidence": 0.884,
"severity": "medium",
"timestamp": "2026-01-03T09:25:00Z",
"trace_id": "dbce9721-e0dd-8fc8-5c88-e74f6fd76420"
} | {
"account_age_days": 1009,
"account_id": "ACCT-E6B08CF4921B",
"baseline_risk_score": 0.234,
"kyc_tier": "tier_1",
"session_entropy": 0.106
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 247,
"timestamp": "2026-01-03T00:18:00Z",
"transaction_amount_usd": 14.22
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.458,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2169985.31,
"financial_exposure_usd": 4648050.81,
"recoverable_pct": 0.419
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.