schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107204",
"label": "benign",
"label_confidence": 0.456,
"severity": "medium",
"timestamp": "2026-01-06T00:04:00Z",
"trace_id": "0b787943-6af9-0abc-7b9d-4b4fb74f338c"
} | {
"account_age_days": 1415,
"account_id": "ACCT-43366AF61F12",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_2",
"session_entropy": 0.139
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 357,
"timestamp": "2026-01-06T00:04:00Z",
"transaction_amount_usd": 12027.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1687.92,
"financial_exposure_usd": 2558.98,
"recoverable_pct": 0.934
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109830",
"label": "benign",
"label_confidence": 0.533,
"severity": "medium",
"timestamp": "2026-01-07T19:50:00Z",
"trace_id": "66e25708-4aca-047a-e366-123978503b27"
} | {
"account_age_days": 1101,
"account_id": "ACCT-B466075D88F6",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.932
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 311,
"timestamp": "2026-01-07T13:40:00Z",
"transaction_amount_usd": 19.89
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.524,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 815.06,
"financial_exposure_usd": 1263.46,
"recoverable_pct": 0.447
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100703",
"label": "fraudulent",
"label_confidence": 0.765,
"severity": "critical",
"timestamp": "2026-01-01T11:43:00Z",
"trace_id": "0d35c979-6107-5f58-3194-cdf0d1636e46"
} | {
"account_age_days": 1735,
"account_id": "ACCT-5ED9B3C30514",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_2",
"session_entropy": 0.371
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "MY",
"latency_ms": 397,
"timestamp": "2026-01-01T11:43:00Z",
"transaction_amount_usd": 116664.96
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.387,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 1118233.77,
"financial_exposure_usd": 1169868.94,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108846",
"label": "benign",
"label_confidence": 0.682,
"severity": "medium",
"timestamp": "2026-01-07T03:26:00Z",
"trace_id": "b365ac96-ac5e-7266-ca8b-4c4669259f38"
} | {
"account_age_days": 953,
"account_id": "ACCT-232C66537B00",
"baseline_risk_score": 0.086,
"kyc_tier": "tier_1",
"session_entropy": 0.448
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 244,
"timestamp": "2026-01-07T03:26:00Z",
"transaction_amount_usd": 14900.27
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.486,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1232.93,
"financial_exposure_usd": 1922.94,
"recoverable_pct": 0.727
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104748",
"label": "fraudulent",
"label_confidence": 0.751,
"severity": "medium",
"timestamp": "2026-01-04T07:08:00Z",
"trace_id": "53d21187-ef2a-a68b-a601-cc4f8118a600"
} | {
"account_age_days": 994,
"account_id": "ACCT-24F2BBCD3665",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_1",
"session_entropy": 0.823
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 336,
"timestamp": "2026-01-04T04:01:00Z",
"transaction_amount_usd": 9.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.695,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 817218.76,
"financial_exposure_usd": 1948431.43,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108167",
"label": "benign",
"label_confidence": 0.529,
"severity": "medium",
"timestamp": "2026-01-06T16:07:00Z",
"trace_id": "b5ceb40b-7614-6fac-384b-421fed45eca2"
} | {
"account_age_days": 853,
"account_id": "ACCT-156E7A511635",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_2",
"session_entropy": 0.426
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1108,
"timestamp": "2026-01-06T16:07:00Z",
"transaction_amount_usd": 853.97
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 233.54,
"financial_exposure_usd": 349.14,
"recoverable_pct": 0.889
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102488",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "medium",
"timestamp": "2026-01-02T17:28:00Z",
"trace_id": "99ac05ff-228d-b914-9108-99e44aa982de"
} | {
"account_age_days": 432,
"account_id": "ACCT-2FFC73DFB41E",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_2",
"session_entropy": 0.87
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 478,
"timestamp": "2026-01-02T17:28:00Z",
"transaction_amount_usd": 6430.1
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.686,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 798069.96,
"financial_exposure_usd": 824221.31,
"recoverable_pct": 0.777
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104917",
"label": "fraudulent",
"label_confidence": 0.734,
"severity": "low",
"timestamp": "2026-01-04T09:57:00Z",
"trace_id": "b05fa78e-a952-0b15-afba-faf4bcd0f7f8"
} | {
"account_age_days": 138,
"account_id": "ACCT-29717CC88FA3",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_3",
"session_entropy": 0.67
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 167,
"timestamp": "2026-01-04T01:03:00Z",
"transaction_amount_usd": 9.1
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.715,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3932853.03,
"financial_exposure_usd": 5702297.72,
"recoverable_pct": 0.863
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104257",
"label": "fraudulent",
"label_confidence": 0.735,
"severity": "low",
"timestamp": "2026-01-03T22:57:00Z",
"trace_id": "23659c23-c24f-c520-1ea2-770a20183532"
} | {
"account_age_days": 1030,
"account_id": "ACCT-24C5B671DEC9",
"baseline_risk_score": 0.241,
"kyc_tier": "tier_3",
"session_entropy": 0.516
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 344,
"timestamp": "2026-01-03T19:35:00Z",
"transaction_amount_usd": 21.16
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.741,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 8",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2719446.48,
"financial_exposure_usd": 3855347.47,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105773",
"label": "fraudulent",
"label_confidence": 0.75,
"severity": "medium",
"timestamp": "2026-01-05T00:13:00Z",
"trace_id": "bdbf1eb5-2702-ed11-3a7a-7d32b1bca157"
} | {
"account_age_days": 74,
"account_id": "ACCT-1E778585724E",
"baseline_risk_score": 0.21,
"kyc_tier": "tier_1",
"session_entropy": 0.341
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1008,
"timestamp": "2026-01-05T00:13:00Z",
"transaction_amount_usd": 1839282.21
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.58,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 1733361.93,
"financial_exposure_usd": 2461558.93,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109925",
"label": "benign",
"label_confidence": 0.716,
"severity": "low",
"timestamp": "2026-01-07T21:25:00Z",
"trace_id": "a42ef16f-717f-60d1-d877-316354d8d4bd"
} | {
"account_age_days": 96,
"account_id": "ACCT-75B999E9797A",
"baseline_risk_score": 0.181,
"kyc_tier": "tier_2",
"session_entropy": 0.929
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 724,
"timestamp": "2026-01-07T21:25:00Z",
"transaction_amount_usd": 5884.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.792,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3202.49,
"financial_exposure_usd": 3252.7,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105188",
"label": "fraudulent",
"label_confidence": 0.793,
"severity": "low",
"timestamp": "2026-01-04T14:28:00Z",
"trace_id": "3cf45b37-4fbd-2df0-7ae1-5f5929aa34b7"
} | {
"account_age_days": 95,
"account_id": "ACCT-BDC4A4B8591E",
"baseline_risk_score": 0.448,
"kyc_tier": "tier_2",
"session_entropy": 0.38
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 97,
"timestamp": "2026-01-04T14:28:00Z",
"transaction_amount_usd": 490673.93
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.394,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1283983.51,
"financial_exposure_usd": 2073017.83,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102303",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "low",
"timestamp": "2026-01-02T14:23:00Z",
"trace_id": "c547cb92-efd9-e6ed-eedc-7f9af7e89039"
} | {
"account_age_days": 409,
"account_id": "ACCT-8A75D694C9D3",
"baseline_risk_score": 0.559,
"kyc_tier": "tier_1",
"session_entropy": 0.331
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 263,
"timestamp": "2026-01-02T14:23:00Z",
"transaction_amount_usd": 74032.81
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.597,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 500317.52,
"financial_exposure_usd": 519990.81,
"recoverable_pct": 0.55
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108730",
"label": "benign",
"label_confidence": 0.702,
"severity": "low",
"timestamp": "2026-01-07T01:30:00Z",
"trace_id": "cde59a5f-9a7f-2b8a-42db-4e0c4c904b0b"
} | {
"account_age_days": 1787,
"account_id": "ACCT-88A9EA7DDD47",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_1",
"session_entropy": 0.365
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 1057,
"timestamp": "2026-01-07T01:30:00Z",
"transaction_amount_usd": 11277.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.47,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 1281.89,
"financial_exposure_usd": 2790.26,
"recoverable_pct": 0.963
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104617",
"label": "fraudulent",
"label_confidence": 0.827,
"severity": "high",
"timestamp": "2026-01-04T04:57:00Z",
"trace_id": "8ea4d0a5-0243-960f-360c-183e0d4e2800"
} | {
"account_age_days": 762,
"account_id": "ACCT-8EB5A22BB65C",
"baseline_risk_score": 0.055,
"kyc_tier": "tier_3",
"session_entropy": 0.35
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 295,
"timestamp": "2026-01-04T04:57:00Z",
"transaction_amount_usd": 1470614.25
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.566,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4450237.31,
"financial_exposure_usd": 5567460.29,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102377",
"label": "fraudulent",
"label_confidence": 0.828,
"severity": "high",
"timestamp": "2026-01-02T15:37:00Z",
"trace_id": "277e00b1-5bf5-6ff0-46ce-b302bd36923b"
} | {
"account_age_days": 124,
"account_id": "ACCT-F8F039E55BF2",
"baseline_risk_score": 0.479,
"kyc_tier": "tier_1",
"session_entropy": 0.221
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 318,
"timestamp": "2026-01-02T13:05:00Z",
"transaction_amount_usd": 6.77
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 657731.53,
"financial_exposure_usd": 1121057.75,
"recoverable_pct": 0.697
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102152",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "critical",
"timestamp": "2026-01-02T11:52:00Z",
"trace_id": "2c1b0d85-4b34-2601-02c6-6759fccf9a32"
} | {
"account_age_days": 1401,
"account_id": "ACCT-958B442574B5",
"baseline_risk_score": 0.357,
"kyc_tier": "tier_1",
"session_entropy": 0.371
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 753,
"timestamp": "2026-01-02T11:52:00Z",
"transaction_amount_usd": 39436.28
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.848,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 462796.4,
"financial_exposure_usd": 953590.36,
"recoverable_pct": 0.06
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100747",
"label": "fraudulent",
"label_confidence": 0.857,
"severity": "low",
"timestamp": "2026-01-01T12:27:00Z",
"trace_id": "d0b79f3f-8755-792b-ca18-67a67413f788"
} | {
"account_age_days": 904,
"account_id": "ACCT-5617BE7B7A0D",
"baseline_risk_score": 0.491,
"kyc_tier": "tier_2",
"session_entropy": 0.339
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 367,
"timestamp": "2026-01-01T12:27:00Z",
"transaction_amount_usd": 548.84
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.729,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 439967.34,
"financial_exposure_usd": 970357.46,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102099",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "critical",
"timestamp": "2026-01-02T10:59:00Z",
"trace_id": "aa8bc2ff-f935-d06e-d451-25d4b54f9ae7"
} | {
"account_age_days": 745,
"account_id": "ACCT-87CC18E8BCF2",
"baseline_risk_score": 0.422,
"kyc_tier": "tier_1",
"session_entropy": 0.53
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 98,
"timestamp": "2026-01-02T10:59:00Z",
"transaction_amount_usd": 110313.39
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.894,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 568383.16,
"financial_exposure_usd": 582232.54,
"recoverable_pct": 0.378
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103593",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "medium",
"timestamp": "2026-01-03T11:53:00Z",
"trace_id": "2249bbdd-84ec-cebf-e247-dc07bd1acac3"
} | {
"account_age_days": 311,
"account_id": "ACCT-B9347B36BB89",
"baseline_risk_score": 0.446,
"kyc_tier": "tier_3",
"session_entropy": 0.719
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 546,
"timestamp": "2026-01-03T11:53:00Z",
"transaction_amount_usd": 377849.38
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.889,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 5033506.26,
"financial_exposure_usd": 5685416.63,
"recoverable_pct": 0.908
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108937",
"label": "benign",
"label_confidence": 0.466,
"severity": "high",
"timestamp": "2026-01-07T04:57:00Z",
"trace_id": "9d79fbab-d9aa-7abd-ce60-1fccbaecc313"
} | {
"account_age_days": 419,
"account_id": "ACCT-5E8CC2084073",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.848
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 213,
"timestamp": "2026-01-07T04:57:00Z",
"transaction_amount_usd": 3853.51
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.7,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2522.06,
"financial_exposure_usd": 3905.85,
"recoverable_pct": 0.831
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109603",
"label": "benign",
"label_confidence": 0.482,
"severity": "high",
"timestamp": "2026-01-07T16:03:00Z",
"trace_id": "649b7012-0582-12ad-0664-0f52169b16dd"
} | {
"account_age_days": 1767,
"account_id": "ACCT-BD873967CF4E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.524
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 208,
"timestamp": "2026-01-07T16:03:00Z",
"transaction_amount_usd": 14092.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 623.71,
"financial_exposure_usd": 1147.39,
"recoverable_pct": 0.649
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108871",
"label": "benign",
"label_confidence": 0.737,
"severity": "high",
"timestamp": "2026-01-07T03:51:00Z",
"trace_id": "8349dac8-3991-5bff-6619-97c2c2b16b3c"
} | {
"account_age_days": 839,
"account_id": "ACCT-208102D023B6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.544
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 166,
"timestamp": "2026-01-07T03:51:00Z",
"transaction_amount_usd": 11114.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.615,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2547.78,
"financial_exposure_usd": 3717.08,
"recoverable_pct": 0.763
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105508",
"label": "fraudulent",
"label_confidence": 0.885,
"severity": "high",
"timestamp": "2026-01-04T19:48:00Z",
"trace_id": "ea1b2b20-3121-c57b-8655-2786035e46a6"
} | {
"account_age_days": 1921,
"account_id": "ACCT-5E2018DF5541",
"baseline_risk_score": 0.397,
"kyc_tier": "tier_2",
"session_entropy": 0.243
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1040,
"timestamp": "2026-01-04T19:48:00Z",
"transaction_amount_usd": 2240668.05
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.582,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3468102.76,
"financial_exposure_usd": 3977522.61,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106314",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-05T09:14:00Z",
"trace_id": "7e863843-3bfd-0896-625d-2064192eebde"
} | {
"account_age_days": 189,
"account_id": "ACCT-F7FBFBE4411E",
"baseline_risk_score": 0.173,
"kyc_tier": "tier_3",
"session_entropy": 0.942
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 515,
"timestamp": "2026-01-05T09:14:00Z",
"transaction_amount_usd": 2639479.89
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.884,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1400482.29,
"financial_exposure_usd": 3143750.47,
"recoverable_pct": 0.87
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105979",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "medium",
"timestamp": "2026-01-05T03:39:00Z",
"trace_id": "374d8079-d041-25ad-a820-afc06be913ca"
} | {
"account_age_days": 1613,
"account_id": "ACCT-AE649738E655",
"baseline_risk_score": 0.147,
"kyc_tier": "tier_1",
"session_entropy": 0.548
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 598,
"timestamp": "2026-01-05T03:39:00Z",
"transaction_amount_usd": 2451036.08
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.483,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2208525.33,
"financial_exposure_usd": 5511145.52,
"recoverable_pct": 0.9
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107820",
"label": "benign",
"label_confidence": 0.505,
"severity": "medium",
"timestamp": "2026-01-06T10:20:00Z",
"trace_id": "5aa2d977-8b37-ea77-1f14-a512cb52b219"
} | {
"account_age_days": 1367,
"account_id": "ACCT-A98E7C4D2B32",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_2",
"session_entropy": 0.913
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 488,
"timestamp": "2026-01-06T10:20:00Z",
"transaction_amount_usd": 8121.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.609,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2947.11,
"financial_exposure_usd": 6906.35,
"recoverable_pct": 0.415
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108991",
"label": "benign",
"label_confidence": 0.648,
"severity": "high",
"timestamp": "2026-01-07T05:51:00Z",
"trace_id": "0fcabf8b-0ddc-8f5b-77c1-f34db6346f3b"
} | {
"account_age_days": 863,
"account_id": "ACCT-59406796471B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.126
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 358,
"timestamp": "2026-01-06T20:04:00Z",
"transaction_amount_usd": 18.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2160.44,
"financial_exposure_usd": 2260.45,
"recoverable_pct": 0.621
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106702",
"label": "benign",
"label_confidence": 0.742,
"severity": "high",
"timestamp": "2026-01-05T15:42:00Z",
"trace_id": "d2a0155b-dbc8-4973-96cf-3e35bfd76512"
} | {
"account_age_days": 1346,
"account_id": "ACCT-FA17A4D667D0",
"baseline_risk_score": 0.07,
"kyc_tier": "tier_3",
"session_entropy": 0.546
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 318,
"timestamp": "2026-01-05T15:42:00Z",
"transaction_amount_usd": 2741.68
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.614,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2635.84,
"financial_exposure_usd": 4025.46,
"recoverable_pct": 0.429
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101317",
"label": "fraudulent",
"label_confidence": 0.978,
"severity": "high",
"timestamp": "2026-01-01T21:57:00Z",
"trace_id": "89fc1310-9e34-daf9-128a-743da012dcc2"
} | {
"account_age_days": 1324,
"account_id": "ACCT-ED79E7C76AAE",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_1",
"session_entropy": 0.662
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1176,
"timestamp": "2026-01-01T21:57:00Z",
"transaction_amount_usd": 93164.28
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.704,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 849888.4,
"financial_exposure_usd": 906665.05,
"recoverable_pct": 0.347
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108012",
"label": "benign",
"label_confidence": 0.564,
"severity": "medium",
"timestamp": "2026-01-06T13:32:00Z",
"trace_id": "278299cb-d1c0-57bd-3314-d0367a247167"
} | {
"account_age_days": 660,
"account_id": "ACCT-8753428A707E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.539
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1009,
"timestamp": "2026-01-06T13:32:00Z",
"transaction_amount_usd": 3273.91
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.557,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5485.09,
"financial_exposure_usd": 9016.58,
"recoverable_pct": 0.545
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100865",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "critical",
"timestamp": "2026-01-01T14:25:00Z",
"trace_id": "098acba1-f76c-3b2e-96fe-bf1df8624c2b"
} | {
"account_age_days": 1058,
"account_id": "ACCT-D7EA6028E56C",
"baseline_risk_score": 0.53,
"kyc_tier": "tier_1",
"session_entropy": 0.728
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 228,
"timestamp": "2026-01-01T10:57:00Z",
"transaction_amount_usd": 8.16
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.361,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 660978.42,
"financial_exposure_usd": 670196.56,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105295",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-04T16:15:00Z",
"trace_id": "1f99f64f-3498-82b8-8db5-0910a7665861"
} | {
"account_age_days": 566,
"account_id": "ACCT-BB18DCD54F3A",
"baseline_risk_score": 0.322,
"kyc_tier": "tier_2",
"session_entropy": 0.776
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 597,
"timestamp": "2026-01-04T16:15:00Z",
"transaction_amount_usd": 221063.67
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.948,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2807240.49,
"financial_exposure_usd": 3976464.38,
"recoverable_pct": 0.604
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108722",
"label": "benign",
"label_confidence": 0.558,
"severity": "medium",
"timestamp": "2026-01-07T01:22:00Z",
"trace_id": "c3359d46-1174-ff9e-1049-6f1f84d322c6"
} | {
"account_age_days": 1100,
"account_id": "ACCT-BB4D171BA4C1",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_3",
"session_entropy": 0.879
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 246,
"timestamp": "2026-01-07T01:22:00Z",
"transaction_amount_usd": 1615.4
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.575,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 5960.39,
"financial_exposure_usd": 8207.97,
"recoverable_pct": 0.641
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103086",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "critical",
"timestamp": "2026-01-03T03:26:00Z",
"trace_id": "7e01225d-ac78-4c38-5661-2ec2745992fc"
} | {
"account_age_days": 1652,
"account_id": "ACCT-599CB9A1942E",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_1",
"session_entropy": 0.101
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 157,
"timestamp": "2026-01-02T19:24:00Z",
"transaction_amount_usd": 5.98
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.357,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 768030.11,
"financial_exposure_usd": 1013986.57,
"recoverable_pct": 0.562
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108277",
"label": "benign",
"label_confidence": 0.453,
"severity": "low",
"timestamp": "2026-01-06T17:57:00Z",
"trace_id": "f04b15ab-c4da-d75f-0748-83f2fcfd4a08"
} | {
"account_age_days": 1783,
"account_id": "ACCT-CE4E95D215FA",
"baseline_risk_score": 0.124,
"kyc_tier": "tier_1",
"session_entropy": 0.418
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 98,
"timestamp": "2026-01-06T17:57:00Z",
"transaction_amount_usd": 1105.04
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.566,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2317.99,
"financial_exposure_usd": 3881.35,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101940",
"label": "fraudulent",
"label_confidence": 0.896,
"severity": "low",
"timestamp": "2026-01-02T08:20:00Z",
"trace_id": "4782d4f4-82a7-f23d-0838-f55341f6ddd0"
} | {
"account_age_days": 538,
"account_id": "ACCT-0BBEC01042ED",
"baseline_risk_score": 0.389,
"kyc_tier": "tier_3",
"session_entropy": 0.748
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 476,
"timestamp": "2026-01-02T08:20:00Z",
"transaction_amount_usd": 2491.55
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.84,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 676627.67,
"financial_exposure_usd": 859594.19,
"recoverable_pct": 0.475
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109703",
"label": "benign",
"label_confidence": 0.635,
"severity": "medium",
"timestamp": "2026-01-07T17:43:00Z",
"trace_id": "be57c824-7581-0844-b6fd-449abf131aa7"
} | {
"account_age_days": 492,
"account_id": "ACCT-9CEDC4F87551",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.593
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 221,
"timestamp": "2026-01-07T07:19:00Z",
"transaction_amount_usd": 9.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.599,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2952.44,
"financial_exposure_usd": 7243.18,
"recoverable_pct": 0.599
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102243",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "critical",
"timestamp": "2026-01-02T13:23:00Z",
"trace_id": "4576b8bf-91c8-4011-5ba2-6db058254136"
} | {
"account_age_days": 632,
"account_id": "ACCT-820915D25DCE",
"baseline_risk_score": 0.425,
"kyc_tier": "tier_2",
"session_entropy": 0.442
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 688,
"timestamp": "2026-01-02T13:23:00Z",
"transaction_amount_usd": 6795.73
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.824,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 398722.89,
"financial_exposure_usd": 593589.63,
"recoverable_pct": 0.606
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107970",
"label": "benign",
"label_confidence": 0.74,
"severity": "low",
"timestamp": "2026-01-06T12:50:00Z",
"trace_id": "380db787-9298-3c83-c12c-c823cdfbb7bd"
} | {
"account_age_days": 761,
"account_id": "ACCT-6D24C07C7B01",
"baseline_risk_score": 0.129,
"kyc_tier": "tier_1",
"session_entropy": 0.299
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 487,
"timestamp": "2026-01-06T12:50:00Z",
"transaction_amount_usd": 6474.77
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6119.02,
"financial_exposure_usd": 7781.91,
"recoverable_pct": 0.463
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109847",
"label": "benign",
"label_confidence": 0.691,
"severity": "low",
"timestamp": "2026-01-07T20:07:00Z",
"trace_id": "76d7529d-e0a5-bfac-fad7-42ddf88eecb9"
} | {
"account_age_days": 289,
"account_id": "ACCT-7B2527814038",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.759
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 357,
"timestamp": "2026-01-07T11:38:00Z",
"transaction_amount_usd": 8.58
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.761,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3292.12,
"financial_exposure_usd": 3615.71,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103240",
"label": "fraudulent",
"label_confidence": 0.815,
"severity": "medium",
"timestamp": "2026-01-03T06:00:00Z",
"trace_id": "d44ae725-3948-b0b3-9247-8e7c05719699"
} | {
"account_age_days": 1834,
"account_id": "ACCT-D7F2BF059AEE",
"baseline_risk_score": 0.578,
"kyc_tier": "tier_1",
"session_entropy": 0.375
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 880,
"timestamp": "2026-01-03T06:00:00Z",
"transaction_amount_usd": 45677.54
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.949,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 998659.6,
"financial_exposure_usd": 1101389.32,
"recoverable_pct": 0.04
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105991",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "critical",
"timestamp": "2026-01-05T03:51:00Z",
"trace_id": "3c380841-53f9-47b6-7c18-473ca2705780"
} | {
"account_age_days": 1864,
"account_id": "ACCT-4BBFD2B5D15F",
"baseline_risk_score": 0.059,
"kyc_tier": "tier_2",
"session_entropy": 0.656
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 504,
"timestamp": "2026-01-05T03:51:00Z",
"transaction_amount_usd": 2598342.48
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.501,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3183754.19,
"financial_exposure_usd": 4088306.13,
"recoverable_pct": 0.481
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109163",
"label": "benign",
"label_confidence": 0.648,
"severity": "low",
"timestamp": "2026-01-07T08:43:00Z",
"trace_id": "40fd1d50-0043-ed4a-5608-d117a10de915"
} | {
"account_age_days": 433,
"account_id": "ACCT-8D17DD40185F",
"baseline_risk_score": 0.064,
"kyc_tier": "tier_3",
"session_entropy": 0.88
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 233,
"timestamp": "2026-01-07T06:34:00Z",
"transaction_amount_usd": 3.42
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.64,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND pr... | {
"customer_funds_at_risk_usd": 439.31,
"financial_exposure_usd": 1076.33,
"recoverable_pct": 0.943
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105270",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "low",
"timestamp": "2026-01-04T15:50:00Z",
"trace_id": "9b6e83f8-be06-2fff-5654-1f4c6d11ab8c"
} | {
"account_age_days": 1958,
"account_id": "ACCT-3B043EEEBC83",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_1",
"session_entropy": 0.497
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 94,
"timestamp": "2026-01-04T09:32:00Z",
"transaction_amount_usd": 20.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.664,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3640181.37,
"financial_exposure_usd": 5311802.55,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103111",
"label": "fraudulent",
"label_confidence": 0.892,
"severity": "high",
"timestamp": "2026-01-03T03:51:00Z",
"trace_id": "d5e8c055-73d8-f39d-6ab8-562170f9da70"
} | {
"account_age_days": 67,
"account_id": "ACCT-9830F30105A8",
"baseline_risk_score": 0.644,
"kyc_tier": "tier_2",
"session_entropy": 0.863
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 114,
"timestamp": "2026-01-02T17:15:00Z",
"transaction_amount_usd": 8.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.903,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 345206.89,
"financial_exposure_usd": 370458.1,
"recoverable_pct": 0.753
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100008",
"label": "fraudulent",
"label_confidence": 0.822,
"severity": "medium",
"timestamp": "2026-01-01T00:08:00Z",
"trace_id": "d72b6108-2a40-5f12-b963-f37f67814c1f"
} | {
"account_age_days": 1467,
"account_id": "ACCT-60141DE9F54A",
"baseline_risk_score": 0.26,
"kyc_tier": "tier_1",
"session_entropy": 0.437
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 135,
"timestamp": "2026-01-01T00:08:00Z",
"transaction_amount_usd": 117696.28
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.705,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 239440.81,
"financial_exposure_usd": 519235.82,
"recoverable_pct": 0.657
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105621",
"label": "fraudulent",
"label_confidence": 0.902,
"severity": "low",
"timestamp": "2026-01-04T21:41:00Z",
"trace_id": "aaade391-f4e0-3306-5b4b-11bb490e4c38"
} | {
"account_age_days": 1284,
"account_id": "ACCT-AD84691762D2",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_2",
"session_entropy": 0.646
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 592,
"timestamp": "2026-01-04T21:41:00Z",
"transaction_amount_usd": 1934851.66
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.518,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2324233.67,
"financial_exposure_usd": 3958677.07,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106417",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-05T10:57:00Z",
"trace_id": "efd11970-78f5-a794-8c9a-ee0e1989025b"
} | {
"account_age_days": 1355,
"account_id": "ACCT-8D988CBF8FEF",
"baseline_risk_score": 0.424,
"kyc_tier": "tier_3",
"session_entropy": 0.557
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 187,
"timestamp": "2026-01-05T01:42:00Z",
"transaction_amount_usd": 17.02
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.759,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3274533.04,
"financial_exposure_usd": 7575385.1,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105881",
"label": "fraudulent",
"label_confidence": 0.759,
"severity": "medium",
"timestamp": "2026-01-05T02:01:00Z",
"trace_id": "2863fe9a-fc77-f178-08d4-731abc3cf479"
} | {
"account_age_days": 1437,
"account_id": "ACCT-7C364F22B0BA",
"baseline_risk_score": 0.284,
"kyc_tier": "tier_3",
"session_entropy": 0.755
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 868,
"timestamp": "2026-01-05T02:01:00Z",
"transaction_amount_usd": 2458911.75
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3574411.03,
"financial_exposure_usd": 3632517.31,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101120",
"label": "fraudulent",
"label_confidence": 0.76,
"severity": "medium",
"timestamp": "2026-01-01T18:40:00Z",
"trace_id": "b35f0786-0460-3c24-e183-5b7a68a52c22"
} | {
"account_age_days": 1305,
"account_id": "ACCT-F79FBD79F98E",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_2",
"session_entropy": 0.632
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 118,
"timestamp": "2026-01-01T18:40:00Z",
"transaction_amount_usd": 58434.12
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.688,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 670043.71,
"financial_exposure_usd": 732907.63,
"recoverable_pct": 0.086
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105129",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "high",
"timestamp": "2026-01-04T13:29:00Z",
"trace_id": "e0d9e00f-8314-f303-835b-abfef952c9a8"
} | {
"account_age_days": 1491,
"account_id": "ACCT-68814AE7A922",
"baseline_risk_score": 0.232,
"kyc_tier": "tier_3",
"session_entropy": 0.186
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 719,
"timestamp": "2026-01-04T13:29:00Z",
"transaction_amount_usd": 156410.95
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.593,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3458417.05,
"financial_exposure_usd": 3834817.09,
"recoverable_pct": 0.741
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106700",
"label": "benign",
"label_confidence": 0.553,
"severity": "medium",
"timestamp": "2026-01-05T15:40:00Z",
"trace_id": "e6e5da48-6955-7b2e-a88b-0d814dcfecf3"
} | {
"account_age_days": 1664,
"account_id": "ACCT-1F82AD89A73D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.797
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 579,
"timestamp": "2026-01-05T15:40:00Z",
"transaction_amount_usd": 9458.57
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3702.62,
"financial_exposure_usd": 5788.2,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108484",
"label": "benign",
"label_confidence": 0.728,
"severity": "low",
"timestamp": "2026-01-06T21:24:00Z",
"trace_id": "f94a3916-9312-260d-74ee-167bb56bf2f6"
} | {
"account_age_days": 965,
"account_id": "ACCT-AF6FB08AC2BB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.593
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 192,
"timestamp": "2026-01-06T15:47:00Z",
"transaction_amount_usd": 23.14
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1895.42,
"financial_exposure_usd": 3702.48,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101913",
"label": "fraudulent",
"label_confidence": 0.8,
"severity": "medium",
"timestamp": "2026-01-02T07:53:00Z",
"trace_id": "49e760df-a8cc-1700-519c-63802d1ae488"
} | {
"account_age_days": 1504,
"account_id": "ACCT-5F0F6E44558C",
"baseline_risk_score": 0.435,
"kyc_tier": "tier_2",
"session_entropy": 0.736
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 298,
"timestamp": "2026-01-02T07:53:00Z",
"transaction_amount_usd": 42466.99
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.904,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 617729.23,
"financial_exposure_usd": 776018.53,
"recoverable_pct": 0.039
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109122",
"label": "benign",
"label_confidence": 0.747,
"severity": "medium",
"timestamp": "2026-01-07T08:02:00Z",
"trace_id": "5e1e3bda-cad9-0530-25dc-d53ea2ee2467"
} | {
"account_age_days": 1248,
"account_id": "ACCT-BD0B2365F7C6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.792
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 356,
"timestamp": "2026-01-06T20:37:00Z",
"transaction_amount_usd": 9.12
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.586,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1369.88,
"financial_exposure_usd": 1667.21,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109947",
"label": "benign",
"label_confidence": 0.616,
"severity": "low",
"timestamp": "2026-01-07T21:47:00Z",
"trace_id": "9908d723-0c7e-5179-1d14-7ad6292b1c5a"
} | {
"account_age_days": 145,
"account_id": "ACCT-106E1DC340AB",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.573
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 890,
"timestamp": "2026-01-07T21:47:00Z",
"transaction_amount_usd": 14244.8
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.598,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2847.78,
"financial_exposure_usd": 4609.31,
"recoverable_pct": 0.426
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101293",
"label": "fraudulent",
"label_confidence": 0.95,
"severity": "medium",
"timestamp": "2026-01-01T21:33:00Z",
"trace_id": "493c34c2-9773-b290-7b85-71fe161fbd91"
} | {
"account_age_days": 1750,
"account_id": "ACCT-B4AE37AB6860",
"baseline_risk_score": 0.514,
"kyc_tier": "tier_3",
"session_entropy": 0.132
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 238,
"timestamp": "2026-01-01T13:37:00Z",
"transaction_amount_usd": 16.5
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.457,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1240949.4,
"financial_exposure_usd": 1551314.12,
"recoverable_pct": 0.676
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108234",
"label": "benign",
"label_confidence": 0.697,
"severity": "critical",
"timestamp": "2026-01-06T17:14:00Z",
"trace_id": "395ae796-98e6-d450-93bb-92214921ac51"
} | {
"account_age_days": 1083,
"account_id": "ACCT-F172A0B1A097",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.578
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1136,
"timestamp": "2026-01-06T17:14:00Z",
"transaction_amount_usd": 14919.49
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.535,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2109.54,
"financial_exposure_usd": 3249.41,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107142",
"label": "benign",
"label_confidence": 0.575,
"severity": "low",
"timestamp": "2026-01-05T23:02:00Z",
"trace_id": "a7236b57-262f-1e27-51be-9e43ea80ee7c"
} | {
"account_age_days": 264,
"account_id": "ACCT-644E70D8B8BB",
"baseline_risk_score": 0.087,
"kyc_tier": "tier_1",
"session_entropy": 0.149
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 297,
"timestamp": "2026-01-05T23:02:00Z",
"transaction_amount_usd": 7616.27
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.482,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3807.29,
"financial_exposure_usd": 3858.26,
"recoverable_pct": 0.997
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105400",
"label": "fraudulent",
"label_confidence": 0.603,
"severity": "medium",
"timestamp": "2026-01-04T18:00:00Z",
"trace_id": "37893bc1-55f8-1cc4-92f7-32c7a80117f3"
} | {
"account_age_days": 346,
"account_id": "ACCT-D9BAA1730DA6",
"baseline_risk_score": 0.196,
"kyc_tier": "tier_1",
"session_entropy": 0.327
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 147,
"timestamp": "2026-01-04T18:00:00Z",
"transaction_amount_usd": 1915631.98
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.843,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3161458.57,
"financial_exposure_usd": 4993143.33,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109559",
"label": "benign",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-07T15:19:00Z",
"trace_id": "2a40175f-3f9a-c07e-8957-d73a58d36868"
} | {
"account_age_days": 384,
"account_id": "ACCT-AF9EB3A0F060",
"baseline_risk_score": 0.102,
"kyc_tier": "tier_1",
"session_entropy": 0.806
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 206,
"timestamp": "2026-01-07T15:19:00Z",
"transaction_amount_usd": 9895.03
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.555,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 44.13,
"financial_exposure_usd": 89.76,
"recoverable_pct": 0.408
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100230",
"label": "fraudulent",
"label_confidence": 0.89,
"severity": "critical",
"timestamp": "2026-01-01T03:50:00Z",
"trace_id": "910aa60d-c063-3a98-ea5d-c3def543c14d"
} | {
"account_age_days": 923,
"account_id": "ACCT-D5B5984B50AF",
"baseline_risk_score": 0.616,
"kyc_tier": "tier_2",
"session_entropy": 0.602
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 155,
"timestamp": "2025-12-31T23:48:00Z",
"transaction_amount_usd": 12.17
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.885,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 808203.17,
"financial_exposure_usd": 908050.84,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108103",
"label": "benign",
"label_confidence": 0.591,
"severity": "low",
"timestamp": "2026-01-06T15:03:00Z",
"trace_id": "c3789984-1ccb-b6d0-e02a-33b6dbc58796"
} | {
"account_age_days": 552,
"account_id": "ACCT-78CC98714C13",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.82
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 149,
"timestamp": "2026-01-06T05:04:00Z",
"transaction_amount_usd": 22.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.6,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_tra... | {
"customer_funds_at_risk_usd": 1916.11,
"financial_exposure_usd": 1966.14,
"recoverable_pct": 0.536
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101473",
"label": "fraudulent",
"label_confidence": 0.936,
"severity": "critical",
"timestamp": "2026-01-02T00:33:00Z",
"trace_id": "979189e8-b0c2-49d7-5a1c-cc4967cb0988"
} | {
"account_age_days": 921,
"account_id": "ACCT-3B80D8F34F30",
"baseline_risk_score": 0.436,
"kyc_tier": "tier_1",
"session_entropy": 0.567
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 221,
"timestamp": "2026-01-02T00:33:00Z",
"transaction_amount_usd": 57693.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.521,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 284679.93,
"financial_exposure_usd": 573377.56,
"recoverable_pct": 0.242
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104992",
"label": "fraudulent",
"label_confidence": 0.832,
"severity": "low",
"timestamp": "2026-01-04T11:12:00Z",
"trace_id": "82b485ae-1c96-fa9b-1a27-2a20c64a06b3"
} | {
"account_age_days": 1282,
"account_id": "ACCT-1F788F85A47D",
"baseline_risk_score": 0.143,
"kyc_tier": "tier_2",
"session_entropy": 0.465
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 819,
"timestamp": "2026-01-04T11:12:00Z",
"transaction_amount_usd": 866480.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.421,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 883905.27,
"financial_exposure_usd": 2084940.91,
"recoverable_pct": 0.665
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104334",
"label": "fraudulent",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-04T00:14:00Z",
"trace_id": "096f5e77-8ff7-001c-3fc8-481a32d27beb"
} | {
"account_age_days": 170,
"account_id": "ACCT-C9D60C40D280",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.837
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NG",
"latency_ms": 775,
"timestamp": "2026-01-04T00:14:00Z",
"transaction_amount_usd": 1756757.33
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.553,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 619572.59,
"financial_exposure_usd": 891347.18,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100517",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-01T08:37:00Z",
"trace_id": "55968559-c8bc-2c98-8740-04dabff7e290"
} | {
"account_age_days": 1843,
"account_id": "ACCT-9F558BB0DFB2",
"baseline_risk_score": 0.295,
"kyc_tier": "tier_3",
"session_entropy": 0.244
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 150,
"timestamp": "2026-01-01T08:37:00Z",
"transaction_amount_usd": 40044.66
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.868,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 662274.83,
"financial_exposure_usd": 1453885.13,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107153",
"label": "benign",
"label_confidence": 0.623,
"severity": "medium",
"timestamp": "2026-01-05T23:13:00Z",
"trace_id": "74a17ddc-17c2-5922-e996-dc070e992633"
} | {
"account_age_days": 135,
"account_id": "ACCT-2EC9AE1EC320",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.335
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 293,
"timestamp": "2026-01-05T23:13:00Z",
"transaction_amount_usd": 10276.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 851.81,
"financial_exposure_usd": 974.84,
"recoverable_pct": 0.469
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102689",
"label": "fraudulent",
"label_confidence": 0.933,
"severity": "critical",
"timestamp": "2026-01-02T20:49:00Z",
"trace_id": "a179edd3-553b-205b-8a57-a5d97f2f2566"
} | {
"account_age_days": 1092,
"account_id": "ACCT-7D10D519D297",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_3",
"session_entropy": 0.883
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 132,
"timestamp": "2026-01-02T12:30:00Z",
"transaction_amount_usd": 21.01
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.609,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1183842.72,
"financial_exposure_usd": 1583160.85,
"recoverable_pct": 0.304
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100121",
"label": "fraudulent",
"label_confidence": 0.915,
"severity": "medium",
"timestamp": "2026-01-01T02:01:00Z",
"trace_id": "5804550b-6c0c-32f9-0dfa-be46dbd3e865"
} | {
"account_age_days": 47,
"account_id": "ACCT-3EF7839F8DF4",
"baseline_risk_score": 0.604,
"kyc_tier": "tier_1",
"session_entropy": 0.252
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 1054,
"timestamp": "2026-01-01T02:01:00Z",
"transaction_amount_usd": 77046.3
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.896,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1022127.75,
"financial_exposure_usd": 1137128.46,
"recoverable_pct": 0.117
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105533",
"label": "fraudulent",
"label_confidence": 0.806,
"severity": "medium",
"timestamp": "2026-01-04T20:13:00Z",
"trace_id": "6ba75004-6757-d9cd-bcd7-e03873b9fdd2"
} | {
"account_age_days": 85,
"account_id": "ACCT-8AA8E34DA8C6",
"baseline_risk_score": 0.32,
"kyc_tier": "tier_2",
"session_entropy": 0.54
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 352,
"timestamp": "2026-01-04T13:24:00Z",
"transaction_amount_usd": 18.84
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.774,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2124347.33,
"financial_exposure_usd": 4588703.25,
"recoverable_pct": 0.587
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100296",
"label": "fraudulent",
"label_confidence": 0.802,
"severity": "high",
"timestamp": "2026-01-01T04:56:00Z",
"trace_id": "c03b3a8e-58ed-7798-9c26-6a1b9c137f71"
} | {
"account_age_days": 963,
"account_id": "ACCT-277230DE70D2",
"baseline_risk_score": 0.506,
"kyc_tier": "tier_3",
"session_entropy": 0.77
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 120,
"timestamp": "2025-12-31T22:35:00Z",
"transaction_amount_usd": 9.25
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.554,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 618514.07,
"financial_exposure_usd": 1217721.83,
"recoverable_pct": 0.269
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107359",
"label": "benign",
"label_confidence": 0.746,
"severity": "medium",
"timestamp": "2026-01-06T02:39:00Z",
"trace_id": "613fb5c1-6e44-7050-83c7-7da118cfa21b"
} | {
"account_age_days": 50,
"account_id": "ACCT-F6DAE8B886D8",
"baseline_risk_score": 0.127,
"kyc_tier": "tier_3",
"session_entropy": 0.405
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 257,
"timestamp": "2026-01-05T23:04:00Z",
"transaction_amount_usd": 2
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_c... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.584,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2682.18,
"financial_exposure_usd": 4007.6,
"recoverable_pct": 0.591
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104959",
"label": "fraudulent",
"label_confidence": 0.681,
"severity": "critical",
"timestamp": "2026-01-04T10:39:00Z",
"trace_id": "056598a3-8e2d-4027-3381-006c5062640a"
} | {
"account_age_days": 493,
"account_id": "ACCT-4C9D2E9691E3",
"baseline_risk_score": 0.365,
"kyc_tier": "tier_2",
"session_entropy": 0.731
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 877,
"timestamp": "2026-01-04T10:39:00Z",
"transaction_amount_usd": 2885321.9
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.859,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3022169.43,
"financial_exposure_usd": 6579410.66,
"recoverable_pct": 0.732
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103216",
"label": "fraudulent",
"label_confidence": 0.782,
"severity": "critical",
"timestamp": "2026-01-03T05:36:00Z",
"trace_id": "28b3e484-2c69-bae9-746d-be4dee2c1265"
} | {
"account_age_days": 47,
"account_id": "ACCT-2068AE17E8F6",
"baseline_risk_score": 0.634,
"kyc_tier": "tier_1",
"session_entropy": 0.187
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 884,
"timestamp": "2026-01-03T05:36:00Z",
"transaction_amount_usd": 118085.28
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.372,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 294137.33,
"financial_exposure_usd": 639487.75,
"recoverable_pct": 0.009
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106836",
"label": "benign",
"label_confidence": 0.586,
"severity": "low",
"timestamp": "2026-01-05T17:56:00Z",
"trace_id": "a2322e6c-7681-ee78-9356-4a8a967d990f"
} | {
"account_age_days": 779,
"account_id": "ACCT-E25D7F73626F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.346
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 125,
"timestamp": "2026-01-05T13:42:00Z",
"transaction_amount_usd": 8.87
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1541.47,
"financial_exposure_usd": 1717.18,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108834",
"label": "benign",
"label_confidence": 0.483,
"severity": "high",
"timestamp": "2026-01-07T03:14:00Z",
"trace_id": "57f52616-d09f-51e1-b2c3-8b72e40e36a2"
} | {
"account_age_days": 1250,
"account_id": "ACCT-2DDA7D36E95B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.879
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 1018,
"timestamp": "2026-01-07T03:14:00Z",
"transaction_amount_usd": 12370.29
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3391.92,
"financial_exposure_usd": 7420.11,
"recoverable_pct": 0.553
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102383",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-02T15:43:00Z",
"trace_id": "6ca6b433-6660-1f8c-292d-8eb7dd79011a"
} | {
"account_age_days": 1593,
"account_id": "ACCT-F97E1807DCF0",
"baseline_risk_score": 0.572,
"kyc_tier": "tier_1",
"session_entropy": 0.561
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 762,
"timestamp": "2026-01-02T15:43:00Z",
"transaction_amount_usd": 73936.99
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.811,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 599062.83,
"financial_exposure_usd": 777734.46,
"recoverable_pct": 0.148
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104319",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "high",
"timestamp": "2026-01-03T23:59:00Z",
"trace_id": "fa50c72c-91fe-c50a-3bc9-2c7d4762bc33"
} | {
"account_age_days": 594,
"account_id": "ACCT-38A6CE24F9C6",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_2",
"session_entropy": 0.316
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1084,
"timestamp": "2026-01-03T23:59:00Z",
"transaction_amount_usd": 488429.83
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.612,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5139721.4,
"financial_exposure_usd": 5931023.55,
"recoverable_pct": 0.999
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103748",
"label": "fraudulent",
"label_confidence": 0.738,
"severity": "high",
"timestamp": "2026-01-03T14:28:00Z",
"trace_id": "d0a8b14d-a7b3-11f9-c9af-e5c84cd7e42e"
} | {
"account_age_days": 321,
"account_id": "ACCT-59603A0A01AB",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_1",
"session_entropy": 0.487
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 578,
"timestamp": "2026-01-03T14:28:00Z",
"transaction_amount_usd": 2650265.2
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.732,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1587379.05,
"financial_exposure_usd": 2328198.41,
"recoverable_pct": 0.716
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101109",
"label": "fraudulent",
"label_confidence": 0.829,
"severity": "medium",
"timestamp": "2026-01-01T18:29:00Z",
"trace_id": "3631ea1d-b8aa-8b24-715d-de6ac65b438a"
} | {
"account_age_days": 1380,
"account_id": "ACCT-BA1717E1ECF3",
"baseline_risk_score": 0.623,
"kyc_tier": "tier_3",
"session_entropy": 0.425
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 535,
"timestamp": "2026-01-01T18:29:00Z",
"transaction_amount_usd": 89729.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.426,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 567377.51,
"financial_exposure_usd": 931365.31,
"recoverable_pct": 0.051
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109157",
"label": "benign",
"label_confidence": 0.723,
"severity": "medium",
"timestamp": "2026-01-07T08:37:00Z",
"trace_id": "755a0e25-be9b-5dd1-5cdb-a500f5a54ade"
} | {
"account_age_days": 1584,
"account_id": "ACCT-FF528A493506",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.704
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 858,
"timestamp": "2026-01-07T08:37:00Z",
"transaction_amount_usd": 4162.22
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.713,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 298.24,
"financial_exposure_usd": 518.03,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107126",
"label": "benign",
"label_confidence": 0.499,
"severity": "medium",
"timestamp": "2026-01-05T22:46:00Z",
"trace_id": "092db693-3bb0-9d68-9db7-58f91887d09f"
} | {
"account_age_days": 245,
"account_id": "ACCT-948AEB4E827D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.85
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 85,
"timestamp": "2026-01-05T22:46:00Z",
"transaction_amount_usd": 662.99
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.487,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2058.72,
"financial_exposure_usd": 2797,
"recoverable_pct": 0.928
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108381",
"label": "benign",
"label_confidence": 0.579,
"severity": "medium",
"timestamp": "2026-01-06T19:41:00Z",
"trace_id": "4611e8ae-d7cb-df85-9f10-7d6855f1654e"
} | {
"account_age_days": 1138,
"account_id": "ACCT-5CC52D5A8F59",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_1",
"session_entropy": 0.388
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 382,
"timestamp": "2026-01-06T19:41:00Z",
"transaction_amount_usd": 9078.93
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.789,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1258.23,
"financial_exposure_usd": 2427.79,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106871",
"label": "benign",
"label_confidence": 0.56,
"severity": "high",
"timestamp": "2026-01-05T18:31:00Z",
"trace_id": "34eea16a-581f-9b30-1326-157b04bbc58d"
} | {
"account_age_days": 1056,
"account_id": "ACCT-EEAAB7DAA3BE",
"baseline_risk_score": 0.065,
"kyc_tier": "tier_3",
"session_entropy": 0.693
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 932,
"timestamp": "2026-01-05T18:31:00Z",
"transaction_amount_usd": 3840.01
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1585.21,
"financial_exposure_usd": 3328.59,
"recoverable_pct": 0.492
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107732",
"label": "benign",
"label_confidence": 0.604,
"severity": "low",
"timestamp": "2026-01-06T08:52:00Z",
"trace_id": "fcbddefc-c03b-7119-6296-cc46808ff097"
} | {
"account_age_days": 735,
"account_id": "ACCT-E7B098B25B74",
"baseline_risk_score": 0.101,
"kyc_tier": "tier_2",
"session_entropy": 0.722
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 990,
"timestamp": "2026-01-06T08:52:00Z",
"transaction_amount_usd": 12895.81
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.711,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 619.26,
"financial_exposure_usd": 907.3,
"recoverable_pct": 0.985
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100767",
"label": "fraudulent",
"label_confidence": 0.954,
"severity": "high",
"timestamp": "2026-01-01T12:47:00Z",
"trace_id": "e4753071-5e85-c0dc-bf93-ed8db7e0c16f"
} | {
"account_age_days": 1836,
"account_id": "ACCT-1B8672851BBA",
"baseline_risk_score": 0.561,
"kyc_tier": "tier_3",
"session_entropy": 0.819
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 618,
"timestamp": "2026-01-01T12:47:00Z",
"transaction_amount_usd": 77564.66
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.758,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 569662.55,
"financial_exposure_usd": 645820.14,
"recoverable_pct": 0.351
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101503",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "high",
"timestamp": "2026-01-02T01:03:00Z",
"trace_id": "3d70e409-34ea-4fe7-b93c-2b9b1874779b"
} | {
"account_age_days": 1878,
"account_id": "ACCT-CEEA9636D201",
"baseline_risk_score": 0.415,
"kyc_tier": "tier_3",
"session_entropy": 0.522
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 197,
"timestamp": "2026-01-02T01:03:00Z",
"transaction_amount_usd": 44225.63
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.895,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 289410.96,
"financial_exposure_usd": 706711.53,
"recoverable_pct": 0.561
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109733",
"label": "benign",
"label_confidence": 0.491,
"severity": "low",
"timestamp": "2026-01-07T18:13:00Z",
"trace_id": "12d76c86-e35e-d29b-b4b6-792980021127"
} | {
"account_age_days": 636,
"account_id": "ACCT-DA0ADB25B4C7",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.724
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 336,
"timestamp": "2026-01-07T10:38:00Z",
"transaction_amount_usd": 22.49
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2973.09,
"financial_exposure_usd": 3240.96,
"recoverable_pct": 0.861
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108274",
"label": "benign",
"label_confidence": 0.595,
"severity": "low",
"timestamp": "2026-01-06T17:54:00Z",
"trace_id": "17ac0291-f799-7eb3-1ec7-59f5c1ed87e0"
} | {
"account_age_days": 189,
"account_id": "ACCT-B2C4A1483EB1",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.12
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 916,
"timestamp": "2026-01-06T17:54:00Z",
"transaction_amount_usd": 2019.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.715,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1665.28,
"financial_exposure_usd": 1747.49,
"recoverable_pct": 0.729
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103533",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "high",
"timestamp": "2026-01-03T10:53:00Z",
"trace_id": "1c83a2b3-f90d-bc9e-e7e7-eb7c32a21949"
} | {
"account_age_days": 222,
"account_id": "ACCT-91DC8E5E93CA",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.286
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 341,
"timestamp": "2026-01-03T10:53:00Z",
"transaction_amount_usd": 95816.71
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK_I... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.829,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 5042341.06,
"financial_exposure_usd": 7896968.15,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100200",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-01T03:20:00Z",
"trace_id": "73bd980f-a96b-c761-3717-9e4565706108"
} | {
"account_age_days": 195,
"account_id": "ACCT-56F7E6BB14E1",
"baseline_risk_score": 0.33,
"kyc_tier": "tier_3",
"session_entropy": 0.484
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1120,
"timestamp": "2026-01-01T03:20:00Z",
"transaction_amount_usd": 81122.78
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.362,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 568443.48,
"financial_exposure_usd": 574646.17,
"recoverable_pct": 0.05
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103673",
"label": "fraudulent",
"label_confidence": 0.888,
"severity": "medium",
"timestamp": "2026-01-03T13:13:00Z",
"trace_id": "5de74eae-8149-acdf-7ef9-707c90b8f53f"
} | {
"account_age_days": 1728,
"account_id": "ACCT-F91057776CF3",
"baseline_risk_score": 0.401,
"kyc_tier": "tier_2",
"session_entropy": 0.94
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 670,
"timestamp": "2026-01-03T13:13:00Z",
"transaction_amount_usd": 1040137.6
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.655,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1979458.37,
"financial_exposure_usd": 2656563.43,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105437",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "high",
"timestamp": "2026-01-04T18:37:00Z",
"trace_id": "b2421416-02b7-1a57-55ed-500261cbc74c"
} | {
"account_age_days": 581,
"account_id": "ACCT-7AB4F9356001",
"baseline_risk_score": 0.183,
"kyc_tier": "tier_2",
"session_entropy": 0.627
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 673,
"timestamp": "2026-01-04T18:37:00Z",
"transaction_amount_usd": 1479248.35
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.589,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2677182.22,
"financial_exposure_usd": 3005968.5,
"recoverable_pct": 0.712
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104224",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "critical",
"timestamp": "2026-01-03T22:24:00Z",
"trace_id": "2c6fff18-52d6-882e-bf39-c30c8ac1fff0"
} | {
"account_age_days": 1774,
"account_id": "ACCT-EAC8D2299355",
"baseline_risk_score": 0.356,
"kyc_tier": "tier_3",
"session_entropy": 0.559
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "AE",
"latency_ms": 598,
"timestamp": "2026-01-03T22:24:00Z",
"transaction_amount_usd": 2807490.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.689,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4195506.86,
"financial_exposure_usd": 5196665.55,
"recoverable_pct": 0.835
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105103",
"label": "fraudulent",
"label_confidence": 0.651,
"severity": "high",
"timestamp": "2026-01-04T13:03:00Z",
"trace_id": "1055ea57-7a6b-27a7-3521-e55038d565ff"
} | {
"account_age_days": 664,
"account_id": "ACCT-83878E25EB36",
"baseline_risk_score": 0.344,
"kyc_tier": "tier_3",
"session_entropy": 0.28
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 219,
"timestamp": "2026-01-04T02:24:00Z",
"transaction_amount_usd": 3.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.474,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1455140.75,
"financial_exposure_usd": 2613735.87,
"recoverable_pct": 0.8
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106065",
"label": "fraudulent",
"label_confidence": 0.869,
"severity": "high",
"timestamp": "2026-01-05T05:05:00Z",
"trace_id": "7eff7a8c-6058-da0a-3fa5-3b73639bfa70"
} | {
"account_age_days": 671,
"account_id": "ACCT-A6C5576A0189",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_2",
"session_entropy": 0.243
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 1085,
"timestamp": "2026-01-05T05:05:00Z",
"transaction_amount_usd": 222061.51
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.779,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1911171.23,
"financial_exposure_usd": 3044588.54,
"recoverable_pct": 0.829
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108095",
"label": "benign",
"label_confidence": 0.576,
"severity": "low",
"timestamp": "2026-01-06T14:55:00Z",
"trace_id": "dacb9ad1-7bb0-47a0-4327-49145aac41f9"
} | {
"account_age_days": 1880,
"account_id": "ACCT-33B91446827C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.892
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 126,
"timestamp": "2026-01-06T14:55:00Z",
"transaction_amount_usd": 14643.21
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.779,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1113.56,
"financial_exposure_usd": 2322.3,
"recoverable_pct": 0.411
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109961",
"label": "benign",
"label_confidence": 0.47,
"severity": "low",
"timestamp": "2026-01-07T22:01:00Z",
"trace_id": "c1ed5440-45da-5cba-5a7f-21c3dffa408c"
} | {
"account_age_days": 44,
"account_id": "ACCT-BF3BB5A5F26B",
"baseline_risk_score": 0.153,
"kyc_tier": "tier_3",
"session_entropy": 0.371
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 160,
"timestamp": "2026-01-07T22:01:00Z",
"transaction_amount_usd": 3449.45
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.682,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 6032.01,
"financial_exposure_usd": 6360.17,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.