schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108458",
"label": "benign",
"label_confidence": 0.468,
"severity": "low",
"timestamp": "2026-01-06T20:58:00Z",
"trace_id": "5df6d2ec-3b51-cdf8-b4ca-a2eb53759386"
} | {
"account_age_days": 428,
"account_id": "ACCT-D1359CF2BE55",
"baseline_risk_score": 0.137,
"kyc_tier": "tier_2",
"session_entropy": 0.373
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 158,
"timestamp": "2026-01-06T20:58:00Z",
"transaction_amount_usd": 13550.7
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4179.05,
"financial_exposure_usd": 5799.88,
"recoverable_pct": 0.573
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104875",
"label": "fraudulent",
"label_confidence": 0.688,
"severity": "medium",
"timestamp": "2026-01-04T09:15:00Z",
"trace_id": "6d41739f-2557-107b-3dd1-46d9ea9e26d8"
} | {
"account_age_days": 554,
"account_id": "ACCT-221E7E8460D6",
"baseline_risk_score": 0.335,
"kyc_tier": "tier_3",
"session_entropy": 0.6
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 386,
"timestamp": "2026-01-04T01:28:00Z",
"transaction_amount_usd": 22.49
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.784,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1785222.75,
"financial_exposure_usd": 3816860.65,
"recoverable_pct": 0.672
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101872",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-02T07:12:00Z",
"trace_id": "89009d37-b7df-405e-84d3-33c65afbaa3b"
} | {
"account_age_days": 418,
"account_id": "ACCT-CE1E4AC7AD52",
"baseline_risk_score": 0.402,
"kyc_tier": "tier_3",
"session_entropy": 0.53
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 967,
"timestamp": "2026-01-02T07:12:00Z",
"transaction_amount_usd": 6952.67
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.507,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 254223.94,
"financial_exposure_usd": 278132.91,
"recoverable_pct": 0.038
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105930",
"label": "fraudulent",
"label_confidence": 0.825,
"severity": "high",
"timestamp": "2026-01-05T02:50:00Z",
"trace_id": "97ba5d90-3064-2b5c-893e-57f822851a72"
} | {
"account_age_days": 1126,
"account_id": "ACCT-24972E46B31B",
"baseline_risk_score": 0.119,
"kyc_tier": "tier_1",
"session_entropy": 0.147
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "FR",
"latency_ms": 149,
"timestamp": "2026-01-04T18:51:00Z",
"transaction_amount_usd": 13.9
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.659,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1024227.58,
"financial_exposure_usd": 2099852.27,
"recoverable_pct": 0.774
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107073",
"label": "benign",
"label_confidence": 0.695,
"severity": "critical",
"timestamp": "2026-01-05T21:53:00Z",
"trace_id": "1328bd4a-abbe-30f0-8bd2-54a03b8aceb9"
} | {
"account_age_days": 1941,
"account_id": "ACCT-CEEE5718F6E3",
"baseline_risk_score": 0.172,
"kyc_tier": "tier_1",
"session_entropy": 0.9
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 118,
"timestamp": "2026-01-05T21:53:00Z",
"transaction_amount_usd": 9202.44
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.527,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5987.79,
"financial_exposure_usd": 7848.37,
"recoverable_pct": 0.773
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102594",
"label": "fraudulent",
"label_confidence": 0.906,
"severity": "critical",
"timestamp": "2026-01-02T19:14:00Z",
"trace_id": "1fb147dc-7fa6-22d2-c83f-f1f7500ffc7f"
} | {
"account_age_days": 1518,
"account_id": "ACCT-EE8CE69DF4E3",
"baseline_risk_score": 0.311,
"kyc_tier": "tier_1",
"session_entropy": 0.513
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1071,
"timestamp": "2026-01-02T19:14:00Z",
"transaction_amount_usd": 70786.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.379,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 216567.53,
"financial_exposure_usd": 469248.89,
"recoverable_pct": 0.79
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101452",
"label": "fraudulent",
"label_confidence": 0.847,
"severity": "low",
"timestamp": "2026-01-02T00:12:00Z",
"trace_id": "163a229f-83b4-0e3b-e273-a7fd100cd9a1"
} | {
"account_age_days": 1807,
"account_id": "ACCT-63422C0EF1FE",
"baseline_risk_score": 0.539,
"kyc_tier": "tier_1",
"session_entropy": 0.138
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1069,
"timestamp": "2026-01-02T00:12:00Z",
"transaction_amount_usd": 111081.04
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.79,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 385961.93,
"financial_exposure_usd": 685997.72,
"recoverable_pct": 0.576
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103212",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "low",
"timestamp": "2026-01-03T05:32:00Z",
"trace_id": "6ce49ca6-a6f3-f921-3a66-51dbca103aa8"
} | {
"account_age_days": 1628,
"account_id": "ACCT-08770AF9B93A",
"baseline_risk_score": 0.276,
"kyc_tier": "tier_1",
"session_entropy": 0.879
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 361,
"timestamp": "2026-01-03T05:32:00Z",
"transaction_amount_usd": 8107.99
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.537,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 645333.88,
"financial_exposure_usd": 957219.23,
"recoverable_pct": 0.433
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105616",
"label": "fraudulent",
"label_confidence": 0.864,
"severity": "high",
"timestamp": "2026-01-04T21:36:00Z",
"trace_id": "00b47687-275f-db3a-ed82-8717270365fa"
} | {
"account_age_days": 1327,
"account_id": "ACCT-B40754820920",
"baseline_risk_score": 0.384,
"kyc_tier": "tier_2",
"session_entropy": 0.559
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 1172,
"timestamp": "2026-01-04T21:36:00Z",
"transaction_amount_usd": 338196.06
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.402,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1380664.79,
"financial_exposure_usd": 3351680.6,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109172",
"label": "benign",
"label_confidence": 0.54,
"severity": "high",
"timestamp": "2026-01-07T08:52:00Z",
"trace_id": "9b07092e-e301-1eee-4794-7ea4d4a89e3f"
} | {
"account_age_days": 1916,
"account_id": "ACCT-5A8729A040E5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.861
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 501,
"timestamp": "2026-01-07T08:52:00Z",
"transaction_amount_usd": 306.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.719,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2468.3,
"financial_exposure_usd": 5671.42,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102354",
"label": "fraudulent",
"label_confidence": 0.837,
"severity": "high",
"timestamp": "2026-01-02T15:14:00Z",
"trace_id": "a3d2ef5b-d40a-3055-cb79-e4ab48fcb02f"
} | {
"account_age_days": 1990,
"account_id": "ACCT-F778D8A2CDCD",
"baseline_risk_score": 0.527,
"kyc_tier": "tier_1",
"session_entropy": 0.666
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 83,
"timestamp": "2026-01-02T11:15:00Z",
"transaction_amount_usd": 11.38
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.817,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 390161.28,
"financial_exposure_usd": 919217.87,
"recoverable_pct": 0.519
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107090",
"label": "benign",
"label_confidence": 0.626,
"severity": "low",
"timestamp": "2026-01-05T22:10:00Z",
"trace_id": "c4bb3812-a134-ce34-8d52-b502ba032116"
} | {
"account_age_days": 1363,
"account_id": "ACCT-79561896849F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.313
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 155,
"timestamp": "2026-01-05T17:03:00Z",
"transaction_amount_usd": 10.86
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.533,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3382.06,
"financial_exposure_usd": 7728.64,
"recoverable_pct": 0.875
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100655",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "critical",
"timestamp": "2026-01-01T10:55:00Z",
"trace_id": "bd1c28b8-415d-9757-0d75-ab6186787aa8"
} | {
"account_age_days": 1365,
"account_id": "ACCT-3A4BDE1FC628",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_1",
"session_entropy": 0.161
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 248,
"timestamp": "2026-01-01T01:51:00Z",
"transaction_amount_usd": 12.93
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.84,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 943796.38,
"financial_exposure_usd": 1006129.98,
"recoverable_pct": 0.748
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104109",
"label": "fraudulent",
"label_confidence": 0.919,
"severity": "critical",
"timestamp": "2026-01-03T20:29:00Z",
"trace_id": "bed2d633-46d8-5ad7-9cc9-a34b8a9fd4ec"
} | {
"account_age_days": 1899,
"account_id": "ACCT-29948DAB552A",
"baseline_risk_score": 0.219,
"kyc_tier": "tier_3",
"session_entropy": 0.187
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 85,
"timestamp": "2026-01-03T12:16:00Z",
"transaction_amount_usd": 3.46
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.77,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 577273.2,
"financial_exposure_usd": 825932.34,
"recoverable_pct": 0.881
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100038",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "medium",
"timestamp": "2026-01-01T00:38:00Z",
"trace_id": "0b570720-9cd8-758b-a5a1-c8252a9528c3"
} | {
"account_age_days": 1314,
"account_id": "ACCT-A137F8E467B1",
"baseline_risk_score": 0.474,
"kyc_tier": "tier_3",
"session_entropy": 0.257
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 961,
"timestamp": "2026-01-01T00:38:00Z",
"transaction_amount_usd": 81457.89
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.587,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 349679.62,
"financial_exposure_usd": 522108.59,
"recoverable_pct": 0.365
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103441",
"label": "fraudulent",
"label_confidence": 0.803,
"severity": "medium",
"timestamp": "2026-01-03T09:21:00Z",
"trace_id": "c1dc37c3-c2ce-a198-d1e3-2773721b6d88"
} | {
"account_age_days": 1661,
"account_id": "ACCT-3AF197565E33",
"baseline_risk_score": 0.428,
"kyc_tier": "tier_2",
"session_entropy": 0.189
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 502,
"timestamp": "2026-01-03T09:21:00Z",
"transaction_amount_usd": 655284.19
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.604,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 209383.28,
"financial_exposure_usd": 393090.45,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107693",
"label": "benign",
"label_confidence": 0.557,
"severity": "medium",
"timestamp": "2026-01-06T08:13:00Z",
"trace_id": "bc4f2f54-97a6-cfaf-85c1-f7766ad188a9"
} | {
"account_age_days": 563,
"account_id": "ACCT-43587FB0C613",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.331
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 187,
"timestamp": "2026-01-06T08:13:00Z",
"transaction_amount_usd": 14776.62
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.618,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1011.75,
"financial_exposure_usd": 2458.31,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103627",
"label": "fraudulent",
"label_confidence": 0.789,
"severity": "medium",
"timestamp": "2026-01-03T12:27:00Z",
"trace_id": "11d046e4-d7eb-1bf7-2002-42a7f6044b3a"
} | {
"account_age_days": 96,
"account_id": "ACCT-4D6B223805BC",
"baseline_risk_score": 0.104,
"kyc_tier": "tier_1",
"session_entropy": 0.19
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 1011,
"timestamp": "2026-01-03T12:27:00Z",
"transaction_amount_usd": 2807506.71
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.832,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2054368.43,
"financial_exposure_usd": 2471970.59,
"recoverable_pct": 0.568
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107219",
"label": "benign",
"label_confidence": 0.589,
"severity": "medium",
"timestamp": "2026-01-06T00:19:00Z",
"trace_id": "a4e05382-95d5-1f3b-89a9-3cff36ed984d"
} | {
"account_age_days": 1098,
"account_id": "ACCT-3540EF9C7347",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 976,
"timestamp": "2026-01-06T00:19:00Z",
"transaction_amount_usd": 1779.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2935.83,
"financial_exposure_usd": 3120.97,
"recoverable_pct": 0.798
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103195",
"label": "fraudulent",
"label_confidence": 0.791,
"severity": "medium",
"timestamp": "2026-01-03T05:15:00Z",
"trace_id": "d4f789cf-f6f6-f20e-8f99-c4c0bbe8178a"
} | {
"account_age_days": 1599,
"account_id": "ACCT-4783024AFFDE",
"baseline_risk_score": 0.46,
"kyc_tier": "tier_1",
"session_entropy": 0.262
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 378,
"timestamp": "2026-01-03T05:15:00Z",
"transaction_amount_usd": 87604.21
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.484,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 565597.62,
"financial_exposure_usd": 1063635.18,
"recoverable_pct": 0.764
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107458",
"label": "benign",
"label_confidence": 0.727,
"severity": "high",
"timestamp": "2026-01-06T04:18:00Z",
"trace_id": "5e107398-57e7-f5c6-b4d4-5b217482f5fe"
} | {
"account_age_days": 1842,
"account_id": "ACCT-5771C36E2266",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.11
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 140,
"timestamp": "2026-01-06T04:18:00Z",
"transaction_amount_usd": 7001.07
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.565,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1496.08,
"financial_exposure_usd": 1752.77,
"recoverable_pct": 0.918
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105232",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-04T15:12:00Z",
"trace_id": "ef84940b-7952-6066-c3b1-ca1e5821d1e8"
} | {
"account_age_days": 1859,
"account_id": "ACCT-B5BF76191D9E",
"baseline_risk_score": 0.447,
"kyc_tier": "tier_3",
"session_entropy": 0.877
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 1039,
"timestamp": "2026-01-04T15:12:00Z",
"transaction_amount_usd": 871782.17
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.803,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2952716.45,
"financial_exposure_usd": 3220883.47,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107452",
"label": "benign",
"label_confidence": 0.701,
"severity": "low",
"timestamp": "2026-01-06T04:12:00Z",
"trace_id": "67455488-f439-932f-f32f-1f42d73ab2a8"
} | {
"account_age_days": 1143,
"account_id": "ACCT-B3BFB06C1F68",
"baseline_risk_score": 0.199,
"kyc_tier": "tier_2",
"session_entropy": 0.807
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 572,
"timestamp": "2026-01-06T04:12:00Z",
"transaction_amount_usd": 12899.71
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.763,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 4054.68,
"financial_exposure_usd": 4230.18,
"recoverable_pct": 0.549
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106284",
"label": "fraudulent",
"label_confidence": 0.625,
"severity": "low",
"timestamp": "2026-01-05T08:44:00Z",
"trace_id": "e08a8bc0-82d7-a5a4-bf19-c6eaaff21b1e"
} | {
"account_age_days": 1615,
"account_id": "ACCT-5241F29B0593",
"baseline_risk_score": 0.141,
"kyc_tier": "tier_1",
"session_entropy": 0.306
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 384,
"timestamp": "2026-01-05T08:44:00Z",
"transaction_amount_usd": 2900415.85
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.697,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4490876.33,
"financial_exposure_usd": 5800789.41,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105787",
"label": "fraudulent",
"label_confidence": 0.706,
"severity": "medium",
"timestamp": "2026-01-05T00:27:00Z",
"trace_id": "bfee1299-5368-3981-1cb3-b1b8a68cbadb"
} | {
"account_age_days": 695,
"account_id": "ACCT-6EED71269BF6",
"baseline_risk_score": 0.25,
"kyc_tier": "tier_2",
"session_entropy": 0.648
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 211,
"timestamp": "2026-01-05T00:27:00Z",
"transaction_amount_usd": 2828698.35
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.464,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 874281.2,
"financial_exposure_usd": 1131892.24,
"recoverable_pct": 0.993
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108362",
"label": "benign",
"label_confidence": 0.64,
"severity": "low",
"timestamp": "2026-01-06T19:22:00Z",
"trace_id": "26a07083-c1b4-b124-7ba9-d5fa3823f9c1"
} | {
"account_age_days": 25,
"account_id": "ACCT-827F8A18EFBA",
"baseline_risk_score": 0.057,
"kyc_tier": "tier_1",
"session_entropy": 0.877
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 534,
"timestamp": "2026-01-06T19:22:00Z",
"transaction_amount_usd": 2779.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.776,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2850.41,
"financial_exposure_usd": 4377.13,
"recoverable_pct": 0.768
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107066",
"label": "benign",
"label_confidence": 0.57,
"severity": "low",
"timestamp": "2026-01-05T21:46:00Z",
"trace_id": "271e3ff3-cb9f-ec12-5e27-968cfb646490"
} | {
"account_age_days": 962,
"account_id": "ACCT-95684512B1EA",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.421
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 857,
"timestamp": "2026-01-05T21:46:00Z",
"transaction_amount_usd": 1728.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.617,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5005.6,
"financial_exposure_usd": 5324.08,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104910",
"label": "fraudulent",
"label_confidence": 0.672,
"severity": "medium",
"timestamp": "2026-01-04T09:50:00Z",
"trace_id": "0e5d1255-122f-17ad-1a10-9f38b3fc7d68"
} | {
"account_age_days": 866,
"account_id": "ACCT-378B2E431C86",
"baseline_risk_score": 0.24,
"kyc_tier": "tier_3",
"session_entropy": 0.342
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 359,
"timestamp": "2026-01-04T09:50:00Z",
"transaction_amount_usd": 2983726.88
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.543,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5370747.81,
"financial_exposure_usd": 7125762.52,
"recoverable_pct": 0.699
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109818",
"label": "benign",
"label_confidence": 0.526,
"severity": "medium",
"timestamp": "2026-01-07T19:38:00Z",
"trace_id": "13fea8f2-8b78-918b-f039-4bd2a6eab033"
} | {
"account_age_days": 895,
"account_id": "ACCT-6F3AAAC6C61B",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.315
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 356,
"timestamp": "2026-01-07T19:38:00Z",
"transaction_amount_usd": 13273.98
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.692,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1401.85,
"financial_exposure_usd": 2784.43,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101447",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "critical",
"timestamp": "2026-01-02T00:07:00Z",
"trace_id": "31f12bab-8a93-b2a9-ee83-4d7338c7190c"
} | {
"account_age_days": 1048,
"account_id": "ACCT-7C0BF2E29058",
"baseline_risk_score": 0.55,
"kyc_tier": "tier_1",
"session_entropy": 0.846
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1119,
"timestamp": "2026-01-02T00:07:00Z",
"transaction_amount_usd": 89265.42
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.879,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 849007.37,
"financial_exposure_usd": 973970.09,
"recoverable_pct": 0.501
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102397",
"label": "fraudulent",
"label_confidence": 0.911,
"severity": "high",
"timestamp": "2026-01-02T15:57:00Z",
"trace_id": "fe5a0c4e-f719-dec4-2a0f-176cffcf43ba"
} | {
"account_age_days": 187,
"account_id": "ACCT-F009A2FCF6F9",
"baseline_risk_score": 0.373,
"kyc_tier": "tier_3",
"session_entropy": 0.427
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 694,
"timestamp": "2026-01-02T15:57:00Z",
"transaction_amount_usd": 45627.64
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.615,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 948098.84,
"financial_exposure_usd": 978903.41,
"recoverable_pct": 0.557
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101754",
"label": "fraudulent",
"label_confidence": 0.763,
"severity": "high",
"timestamp": "2026-01-02T05:14:00Z",
"trace_id": "f845963f-b717-6785-eb8f-44eee9efc489"
} | {
"account_age_days": 1745,
"account_id": "ACCT-FE924CC2D646",
"baseline_risk_score": 0.364,
"kyc_tier": "tier_1",
"session_entropy": 0.214
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 283,
"timestamp": "2026-01-02T01:02:00Z",
"transaction_amount_usd": 12.92
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.422,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 485492.83,
"financial_exposure_usd": 583042.07,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106383",
"label": "fraudulent",
"label_confidence": 0.638,
"severity": "high",
"timestamp": "2026-01-05T10:23:00Z",
"trace_id": "e9a6c185-387a-a4b6-4283-47ecf8004741"
} | {
"account_age_days": 683,
"account_id": "ACCT-CDB669F0C830",
"baseline_risk_score": 0.383,
"kyc_tier": "tier_3",
"session_entropy": 0.205
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 643,
"timestamp": "2026-01-05T10:23:00Z",
"transaction_amount_usd": 2684599.71
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.355,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 633587.41,
"financial_exposure_usd": 1140047.99,
"recoverable_pct": 0.883
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105337",
"label": "fraudulent",
"label_confidence": 0.691,
"severity": "high",
"timestamp": "2026-01-04T16:57:00Z",
"trace_id": "3fea81bb-8d0f-13d5-da02-82ac08667f06"
} | {
"account_age_days": 1303,
"account_id": "ACCT-63910CD7FD53",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_3",
"session_entropy": 0.598
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 197,
"timestamp": "2026-01-04T16:57:00Z",
"transaction_amount_usd": 1036366.65
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.885,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2302466.06,
"financial_exposure_usd": 3401539.19,
"recoverable_pct": 0.594
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106723",
"label": "benign",
"label_confidence": 0.625,
"severity": "medium",
"timestamp": "2026-01-05T16:03:00Z",
"trace_id": "189f65b1-555d-3691-0fdc-e8f312257314"
} | {
"account_age_days": 854,
"account_id": "ACCT-D91B2BB4C75D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.487
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 391,
"timestamp": "2026-01-05T10:16:00Z",
"transaction_amount_usd": 6.93
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.452,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3541.02,
"financial_exposure_usd": 4333.31,
"recoverable_pct": 0.956
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107771",
"label": "benign",
"label_confidence": 0.641,
"severity": "medium",
"timestamp": "2026-01-06T09:31:00Z",
"trace_id": "5e4a83f8-f715-efc0-289c-6cf9686726d6"
} | {
"account_age_days": 1134,
"account_id": "ACCT-C6E6234D81F2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.104
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 438,
"timestamp": "2026-01-06T09:31:00Z",
"transaction_amount_usd": 10546.07
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.752,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4498.52,
"financial_exposure_usd": 6976.38,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103456",
"label": "fraudulent",
"label_confidence": 0.922,
"severity": "medium",
"timestamp": "2026-01-03T09:36:00Z",
"trace_id": "0531a215-3beb-2c31-b3ee-d9e7ef6af388"
} | {
"account_age_days": 568,
"account_id": "ACCT-47E0B61D744F",
"baseline_risk_score": 0.258,
"kyc_tier": "tier_2",
"session_entropy": 0.538
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 225,
"timestamp": "2026-01-03T04:06:00Z",
"transaction_amount_usd": 20.58
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.857,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 8",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2802379.99,
"financial_exposure_usd": 5997817.86,
"recoverable_pct": 0.537
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104048",
"label": "fraudulent",
"label_confidence": 0.78,
"severity": "low",
"timestamp": "2026-01-03T19:28:00Z",
"trace_id": "cf553a2b-e6c8-168f-cf06-0e1130617a9a"
} | {
"account_age_days": 999,
"account_id": "ACCT-3FB80EBFFF6B",
"baseline_risk_score": 0.22,
"kyc_tier": "tier_1",
"session_entropy": 0.805
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 845,
"timestamp": "2026-01-03T19:28:00Z",
"transaction_amount_usd": 1514309
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_IM... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.917,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 6203066.18,
"financial_exposure_usd": 6588414.04,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105980",
"label": "fraudulent",
"label_confidence": 0.723,
"severity": "low",
"timestamp": "2026-01-05T03:40:00Z",
"trace_id": "f7d77e35-b987-3f7c-43d1-8d8399eafbce"
} | {
"account_age_days": 924,
"account_id": "ACCT-4424EEB140CD",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_2",
"session_entropy": 0.418
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 97,
"timestamp": "2026-01-05T03:40:00Z",
"transaction_amount_usd": 1532995.76
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.754,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3629296.85,
"financial_exposure_usd": 5671651.35,
"recoverable_pct": 0.843
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106737",
"label": "benign",
"label_confidence": 0.681,
"severity": "medium",
"timestamp": "2026-01-05T16:17:00Z",
"trace_id": "321593ca-589b-b8e1-5b07-0b711fb67567"
} | {
"account_age_days": 425,
"account_id": "ACCT-FD89FBE4E085",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.696
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 860,
"timestamp": "2026-01-05T16:17:00Z",
"transaction_amount_usd": 5753.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3292.09,
"financial_exposure_usd": 5215.33,
"recoverable_pct": 0.896
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106863",
"label": "benign",
"label_confidence": 0.746,
"severity": "low",
"timestamp": "2026-01-05T18:23:00Z",
"trace_id": "2ffd5771-b495-b17c-5005-15ed9b31125e"
} | {
"account_age_days": 503,
"account_id": "ACCT-12B2C6779437",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.767
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 383,
"timestamp": "2026-01-05T13:49:00Z",
"transaction_amount_usd": 11.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.576,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 2786.77,
"financial_exposure_usd": 2916.06,
"recoverable_pct": 0.939
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100507",
"label": "fraudulent",
"label_confidence": 0.852,
"severity": "medium",
"timestamp": "2026-01-01T08:27:00Z",
"trace_id": "e906705d-2a46-1f1a-e43b-7fccd290bb31"
} | {
"account_age_days": 1204,
"account_id": "ACCT-72733CFD9999",
"baseline_risk_score": 0.456,
"kyc_tier": "tier_3",
"session_entropy": 0.852
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 140,
"timestamp": "2026-01-01T08:27:00Z",
"transaction_amount_usd": 115737.05
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.513,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 354513.45,
"financial_exposure_usd": 452849.29,
"recoverable_pct": 0.278
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109159",
"label": "benign",
"label_confidence": 0.659,
"severity": "medium",
"timestamp": "2026-01-07T08:39:00Z",
"trace_id": "fbdb41b6-4af4-cf51-b9b2-c03d59c13968"
} | {
"account_age_days": 534,
"account_id": "ACCT-A5F61292905D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.567
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 291,
"timestamp": "2026-01-07T08:09:00Z",
"transaction_amount_usd": 23.6
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.756,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3212.61,
"financial_exposure_usd": 4057.5,
"recoverable_pct": 0.539
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105361",
"label": "fraudulent",
"label_confidence": 0.903,
"severity": "low",
"timestamp": "2026-01-04T17:21:00Z",
"trace_id": "5b1df124-022d-cf8f-eda7-5ac4ddd43b9f"
} | {
"account_age_days": 709,
"account_id": "ACCT-12FB73C06CAC",
"baseline_risk_score": 0.161,
"kyc_tier": "tier_3",
"session_entropy": 0.731
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "VE",
"latency_ms": 189,
"timestamp": "2026-01-04T09:05:00Z",
"transaction_amount_usd": 2.93
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.541,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3964051.55,
"financial_exposure_usd": 4587190.48,
"recoverable_pct": 0.825
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103097",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "critical",
"timestamp": "2026-01-03T03:37:00Z",
"trace_id": "59bf2382-6d6d-e819-c8de-df909c176c6f"
} | {
"account_age_days": 941,
"account_id": "ACCT-48DBA5DAEC2C",
"baseline_risk_score": 0.266,
"kyc_tier": "tier_1",
"session_entropy": 0.557
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 902,
"timestamp": "2026-01-03T03:37:00Z",
"transaction_amount_usd": 84471.41
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.801,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 298765.82,
"financial_exposure_usd": 709198.71,
"recoverable_pct": 0.629
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109434",
"label": "benign",
"label_confidence": 0.46,
"severity": "high",
"timestamp": "2026-01-07T13:14:00Z",
"trace_id": "4e326b4a-432d-a702-f63f-afc55d0af715"
} | {
"account_age_days": 612,
"account_id": "ACCT-76FD7784BBBD",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.825
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 725,
"timestamp": "2026-01-07T13:14:00Z",
"transaction_amount_usd": 1732.29
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.71,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3865.56,
"financial_exposure_usd": 4251.82,
"recoverable_pct": 0.71
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109809",
"label": "benign",
"label_confidence": 0.572,
"severity": "medium",
"timestamp": "2026-01-07T19:29:00Z",
"trace_id": "0b832d86-dc2e-6bae-b7f2-cc9c360fb7fc"
} | {
"account_age_days": 1116,
"account_id": "ACCT-E80D0E34FDDB",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_2",
"session_entropy": 0.802
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 352,
"timestamp": "2026-01-07T19:29:00Z",
"transaction_amount_usd": 6165.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.646,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 5115.78,
"financial_exposure_usd": 7404.66,
"recoverable_pct": 0.738
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100852",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "low",
"timestamp": "2026-01-01T14:12:00Z",
"trace_id": "5d9ed614-a126-e29c-5784-45eab589e1c3"
} | {
"account_age_days": 1720,
"account_id": "ACCT-C0805A267122",
"baseline_risk_score": 0.377,
"kyc_tier": "tier_3",
"session_entropy": 0.818
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 492,
"timestamp": "2026-01-01T14:12:00Z",
"transaction_amount_usd": 88556.13
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.477,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 375335.68,
"financial_exposure_usd": 574783.42,
"recoverable_pct": 0.4
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101980",
"label": "fraudulent",
"label_confidence": 0.786,
"severity": "high",
"timestamp": "2026-01-02T09:00:00Z",
"trace_id": "58d6020f-e807-491e-132d-e24ba196f9bd"
} | {
"account_age_days": 137,
"account_id": "ACCT-2005DCE65C77",
"baseline_risk_score": 0.504,
"kyc_tier": "tier_3",
"session_entropy": 0.41
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 885,
"timestamp": "2026-01-02T09:00:00Z",
"transaction_amount_usd": 112629.82
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.805,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 644716.7,
"financial_exposure_usd": 670558.25,
"recoverable_pct": 0.849
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105911",
"label": "fraudulent",
"label_confidence": 0.655,
"severity": "high",
"timestamp": "2026-01-05T02:31:00Z",
"trace_id": "30f76560-2559-7a87-3178-288987bf753a"
} | {
"account_age_days": 1745,
"account_id": "ACCT-DDB1E0FA7F98",
"baseline_risk_score": 0.327,
"kyc_tier": "tier_1",
"session_entropy": 0.67
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "LU",
"latency_ms": 773,
"timestamp": "2026-01-05T02:31:00Z",
"transaction_amount_usd": 312491.48
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.676,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 3089006.85,
"financial_exposure_usd": 4486713.33,
"recoverable_pct": 0.484
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106902",
"label": "benign",
"label_confidence": 0.524,
"severity": "high",
"timestamp": "2026-01-05T19:02:00Z",
"trace_id": "b13f1966-0f7e-c48c-1f6a-fd4768d14c00"
} | {
"account_age_days": 779,
"account_id": "ACCT-4BB7072FE7FE",
"baseline_risk_score": 0.151,
"kyc_tier": "tier_2",
"session_entropy": 0.481
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 960,
"timestamp": "2026-01-05T19:02:00Z",
"transaction_amount_usd": 2599.04
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.505,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1270.43,
"financial_exposure_usd": 2502.72,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107828",
"label": "benign",
"label_confidence": 0.687,
"severity": "critical",
"timestamp": "2026-01-06T10:28:00Z",
"trace_id": "63346531-7bbf-a64c-bb6a-583a1cb63674"
} | {
"account_age_days": 59,
"account_id": "ACCT-E4BB09AB5232",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.671
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 797,
"timestamp": "2026-01-06T10:28:00Z",
"transaction_amount_usd": 13386.62
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.645,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 465.81,
"financial_exposure_usd": 926.26,
"recoverable_pct": 0.946
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101584",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "critical",
"timestamp": "2026-01-02T02:24:00Z",
"trace_id": "ecdba21d-f1d4-b79e-9ab1-80690d7fba4b"
} | {
"account_age_days": 451,
"account_id": "ACCT-53CB9137DB88",
"baseline_risk_score": 0.355,
"kyc_tier": "tier_1",
"session_entropy": 0.915
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "HK",
"latency_ms": 890,
"timestamp": "2026-01-02T02:24:00Z",
"transaction_amount_usd": 65425.11
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.753,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 911813.6,
"financial_exposure_usd": 998861.26,
"recoverable_pct": 0.023
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106728",
"label": "benign",
"label_confidence": 0.531,
"severity": "low",
"timestamp": "2026-01-05T16:08:00Z",
"trace_id": "51728810-a031-f9c9-c3cc-b57454749714"
} | {
"account_age_days": 1432,
"account_id": "ACCT-5E09C4E04D22",
"baseline_risk_score": 0.149,
"kyc_tier": "tier_2",
"session_entropy": 0.43
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 666,
"timestamp": "2026-01-05T16:08:00Z",
"transaction_amount_usd": 3371.12
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.596,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 4342.31,
"financial_exposure_usd": 4943.09,
"recoverable_pct": 0.548
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105500",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "low",
"timestamp": "2026-01-04T19:40:00Z",
"trace_id": "0e42fa97-1017-bf02-7bfe-3a10454f2fd0"
} | {
"account_age_days": 404,
"account_id": "ACCT-A199CEBF36D1",
"baseline_risk_score": 0.408,
"kyc_tier": "tier_1",
"session_entropy": 0.2
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CA",
"latency_ms": 1088,
"timestamp": "2026-01-04T19:40:00Z",
"transaction_amount_usd": 388124.97
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.924,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 6905840.09,
"financial_exposure_usd": 9839791.44,
"recoverable_pct": 0.92
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108748",
"label": "benign",
"label_confidence": 0.583,
"severity": "critical",
"timestamp": "2026-01-07T01:48:00Z",
"trace_id": "e9e9fd66-0ffe-2669-7647-091eb429e870"
} | {
"account_age_days": 354,
"account_id": "ACCT-99C160418A11",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.303
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 596,
"timestamp": "2026-01-07T01:48:00Z",
"transaction_amount_usd": 2164.22
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 4319.26,
"financial_exposure_usd": 7281.17,
"recoverable_pct": 0.766
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105893",
"label": "fraudulent",
"label_confidence": 0.898,
"severity": "high",
"timestamp": "2026-01-05T02:13:00Z",
"trace_id": "ccdec28c-4acf-eefc-e094-38d0c43f812d"
} | {
"account_age_days": 696,
"account_id": "ACCT-E52F7C9F5357",
"baseline_risk_score": 0.392,
"kyc_tier": "tier_3",
"session_entropy": 0.213
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 240,
"timestamp": "2026-01-04T15:15:00Z",
"transaction_amount_usd": 18.39
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.796,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 7047032.86,
"financial_exposure_usd": 9838083.99,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107069",
"label": "benign",
"label_confidence": 0.453,
"severity": "medium",
"timestamp": "2026-01-05T21:49:00Z",
"trace_id": "367dc017-1299-3ce9-5e06-caad4bc45384"
} | {
"account_age_days": 133,
"account_id": "ACCT-98DE307E5A3C",
"baseline_risk_score": 0.114,
"kyc_tier": "tier_2",
"session_entropy": 0.596
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 283,
"timestamp": "2026-01-05T20:33:00Z",
"transaction_amount_usd": 12.92
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 4887.39,
"financial_exposure_usd": 5360.63,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106815",
"label": "benign",
"label_confidence": 0.54,
"severity": "low",
"timestamp": "2026-01-05T17:35:00Z",
"trace_id": "b082d155-1c2a-09f1-7aa0-660b95b5a037"
} | {
"account_age_days": 780,
"account_id": "ACCT-6B6B6F54E59C",
"baseline_risk_score": 0.058,
"kyc_tier": "tier_1",
"session_entropy": 0.468
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 94,
"timestamp": "2026-01-05T17:35:00Z",
"transaction_amount_usd": 8230.43
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.663,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 393.14,
"financial_exposure_usd": 674.62,
"recoverable_pct": 0.711
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106866",
"label": "benign",
"label_confidence": 0.713,
"severity": "low",
"timestamp": "2026-01-05T18:26:00Z",
"trace_id": "3c2b2453-d75e-c413-0354-4ab975d2fc46"
} | {
"account_age_days": 374,
"account_id": "ACCT-FC956A10B8DA",
"baseline_risk_score": 0.107,
"kyc_tier": "tier_3",
"session_entropy": 0.111
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 1159,
"timestamp": "2026-01-05T18:26:00Z",
"transaction_amount_usd": 6603.06
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.661,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3539.77,
"financial_exposure_usd": 4886.63,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106077",
"label": "fraudulent",
"label_confidence": 0.741,
"severity": "high",
"timestamp": "2026-01-05T05:17:00Z",
"trace_id": "311696c8-a926-428b-fcf4-4a3cdee9d3e5"
} | {
"account_age_days": 647,
"account_id": "ACCT-D2C5A403F84A",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_3",
"session_entropy": 0.177
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 1115,
"timestamp": "2026-01-05T05:17:00Z",
"transaction_amount_usd": 900828.46
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.915,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1741068.09,
"financial_exposure_usd": 3683451.61,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106684",
"label": "benign",
"label_confidence": 0.477,
"severity": "low",
"timestamp": "2026-01-05T15:24:00Z",
"trace_id": "6b0e97b0-d9e4-db1e-e2c8-e2fe27633077"
} | {
"account_age_days": 192,
"account_id": "ACCT-36C9B0366732",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.661
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 507,
"timestamp": "2026-01-05T15:24:00Z",
"transaction_amount_usd": 11313.41
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.759,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 3",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3636.66,
"financial_exposure_usd": 4434.23,
"recoverable_pct": 0.581
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105655",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "high",
"timestamp": "2026-01-04T22:15:00Z",
"trace_id": "88fb6e68-9dab-8d84-4dce-e418801ecc91"
} | {
"account_age_days": 515,
"account_id": "ACCT-37B2D09FAF62",
"baseline_risk_score": 0.083,
"kyc_tier": "tier_1",
"session_entropy": 0.679
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 742,
"timestamp": "2026-01-04T22:15:00Z",
"transaction_amount_usd": 1991819.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.713,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2378754.74,
"financial_exposure_usd": 3308557.22,
"recoverable_pct": 0.51
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109782",
"label": "benign",
"label_confidence": 0.728,
"severity": "high",
"timestamp": "2026-01-07T19:02:00Z",
"trace_id": "20da59fe-a204-3586-4d8e-5998f765ee68"
} | {
"account_age_days": 547,
"account_id": "ACCT-140857033D00",
"baseline_risk_score": 0.067,
"kyc_tier": "tier_3",
"session_entropy": 0.655
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 465,
"timestamp": "2026-01-07T19:02:00Z",
"transaction_amount_usd": 11016.11
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.51,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior... | {
"customer_funds_at_risk_usd": 2138.73,
"financial_exposure_usd": 3114.83,
"recoverable_pct": 0.951
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107753",
"label": "benign",
"label_confidence": 0.608,
"severity": "low",
"timestamp": "2026-01-06T09:13:00Z",
"trace_id": "a5baadfd-fe34-6262-444d-1c359c55bf2e"
} | {
"account_age_days": 1879,
"account_id": "ACCT-1A39F65F05D9",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.461
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1046,
"timestamp": "2026-01-06T09:13:00Z",
"transaction_amount_usd": 5586.14
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.611,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 588.95,
"financial_exposure_usd": 876.57,
"recoverable_pct": 0.455
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100081",
"label": "fraudulent",
"label_confidence": 0.81,
"severity": "high",
"timestamp": "2026-01-01T01:21:00Z",
"trace_id": "68ffae17-7428-3491-79c8-42cba8d3110e"
} | {
"account_age_days": 1261,
"account_id": "ACCT-5A9621F59F8C",
"baseline_risk_score": 0.589,
"kyc_tier": "tier_3",
"session_entropy": 0.888
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CH",
"latency_ms": 186,
"timestamp": "2025-12-31T16:54:00Z",
"transaction_amount_usd": 6.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.662,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 383191.74,
"financial_exposure_usd": 550956.53,
"recoverable_pct": 0.153
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103364",
"label": "fraudulent",
"label_confidence": 0.947,
"severity": "high",
"timestamp": "2026-01-03T08:04:00Z",
"trace_id": "4df7248b-9add-0dfb-34a2-36617aaf4850"
} | {
"account_age_days": 1358,
"account_id": "ACCT-5084B31D875B",
"baseline_risk_score": 0.265,
"kyc_tier": "tier_3",
"session_entropy": 0.875
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 836,
"timestamp": "2026-01-03T08:04:00Z",
"transaction_amount_usd": 1976300.13
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.805,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2930957.77,
"financial_exposure_usd": 3961580.13,
"recoverable_pct": 0.574
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101497",
"label": "fraudulent",
"label_confidence": 0.783,
"severity": "high",
"timestamp": "2026-01-02T00:57:00Z",
"trace_id": "2af24e00-8c3c-c43d-9511-ed357078a02e"
} | {
"account_age_days": 1022,
"account_id": "ACCT-FCE4DC18E436",
"baseline_risk_score": 0.4,
"kyc_tier": "tier_2",
"session_entropy": 0.416
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 201,
"timestamp": "2026-01-02T00:57:00Z",
"transaction_amount_usd": 3486.42
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.353,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 645938.17,
"financial_exposure_usd": 707226.25,
"recoverable_pct": 0.395
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106644",
"label": "fraudulent",
"label_confidence": 0.674,
"severity": "low",
"timestamp": "2026-01-05T14:44:00Z",
"trace_id": "ebbb7429-93c6-aafe-ec63-7b01cda566ab"
} | {
"account_age_days": 1399,
"account_id": "ACCT-4546DA55121C",
"baseline_risk_score": 0.332,
"kyc_tier": "tier_3",
"session_entropy": 0.348
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 703,
"timestamp": "2026-01-05T14:44:00Z",
"transaction_amount_usd": 2330058.62
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.461,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 4618915.23,
"financial_exposure_usd": 6064599.58,
"recoverable_pct": 0.624
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108695",
"label": "benign",
"label_confidence": 0.545,
"severity": "critical",
"timestamp": "2026-01-07T00:55:00Z",
"trace_id": "3aabca5a-5be9-400f-d582-678c4538c060"
} | {
"account_age_days": 1806,
"account_id": "ACCT-7BF2801C1F9F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.415
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NL",
"latency_ms": 124,
"timestamp": "2026-01-06T18:22:00Z",
"transaction_amount_usd": 12.88
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.639,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2286.18,
"financial_exposure_usd": 3196.02,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106112",
"label": "fraudulent",
"label_confidence": 0.94,
"severity": "critical",
"timestamp": "2026-01-05T05:52:00Z",
"trace_id": "de4d317e-9aa6-51d4-dfe8-a60e0c0a8729"
} | {
"account_age_days": 997,
"account_id": "ACCT-55C1108B720A",
"baseline_risk_score": 0.343,
"kyc_tier": "tier_3",
"session_entropy": 0.244
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 1039,
"timestamp": "2026-01-05T05:52:00Z",
"transaction_amount_usd": 1721079.2
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.892,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2594120.17,
"financial_exposure_usd": 3175729.52,
"recoverable_pct": 0.477
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108619",
"label": "benign",
"label_confidence": 0.578,
"severity": "high",
"timestamp": "2026-01-06T23:39:00Z",
"trace_id": "04bf6a09-dd33-4f04-56b0-23d43796d64e"
} | {
"account_age_days": 285,
"account_id": "ACCT-E239B796330F",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.95
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 305,
"timestamp": "2026-01-06T19:02:00Z",
"transaction_amount_usd": 22.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.728,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 635.65,
"financial_exposure_usd": 1581.14,
"recoverable_pct": 0.43
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104658",
"label": "fraudulent",
"label_confidence": 0.935,
"severity": "medium",
"timestamp": "2026-01-04T05:38:00Z",
"trace_id": "cdbe1042-4d51-3837-b0c9-fc3bd761d0b5"
} | {
"account_age_days": 448,
"account_id": "ACCT-B25C1F06D081",
"baseline_risk_score": 0.214,
"kyc_tier": "tier_2",
"session_entropy": 0.193
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 380,
"timestamp": "2026-01-03T21:08:00Z",
"transaction_amount_usd": 5.77
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.681,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2368706.51,
"financial_exposure_usd": 5717057.09,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107358",
"label": "benign",
"label_confidence": 0.455,
"severity": "low",
"timestamp": "2026-01-06T02:38:00Z",
"trace_id": "748668ca-7798-1a72-b4c6-2781d6179763"
} | {
"account_age_days": 1636,
"account_id": "ACCT-B3DBC042401E",
"baseline_risk_score": 0.056,
"kyc_tier": "tier_2",
"session_entropy": 0.554
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 88,
"timestamp": "2026-01-06T02:38:00Z",
"transaction_amount_usd": 1160.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.484,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 501.88,
"financial_exposure_usd": 595.61,
"recoverable_pct": 0.59
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107852",
"label": "benign",
"label_confidence": 0.654,
"severity": "low",
"timestamp": "2026-01-06T10:52:00Z",
"trace_id": "2f6ebc40-9717-9d18-87b1-49f58d19f260"
} | {
"account_age_days": 1056,
"account_id": "ACCT-DB5A913D73A0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.414
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 437,
"timestamp": "2026-01-06T10:52:00Z",
"transaction_amount_usd": 14600.95
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.769,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 953.26,
"financial_exposure_usd": 1263.71,
"recoverable_pct": 0.623
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100275",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-01T04:35:00Z",
"trace_id": "58bb8712-8db5-975f-d2c4-47bd1af0bb95"
} | {
"account_age_days": 179,
"account_id": "ACCT-FB26699F1BF5",
"baseline_risk_score": 0.494,
"kyc_tier": "tier_2",
"session_entropy": 0.794
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 144,
"timestamp": "2025-12-31T16:41:00Z",
"transaction_amount_usd": 7.97
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.606,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 9",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 1112052.48,
"financial_exposure_usd": 1313984.42,
"recoverable_pct": 0.193
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101852",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "critical",
"timestamp": "2026-01-02T06:52:00Z",
"trace_id": "da7c6c3a-c901-6c8e-cae1-508d3fcf4a8c"
} | {
"account_age_days": 1544,
"account_id": "ACCT-8A19A6BB7BB7",
"baseline_risk_score": 0.329,
"kyc_tier": "tier_2",
"session_entropy": 0.942
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 1148,
"timestamp": "2026-01-02T06:52:00Z",
"transaction_amount_usd": 45223.76
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.717,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 754926.74,
"financial_exposure_usd": 1510037.08,
"recoverable_pct": 0.056
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108756",
"label": "benign",
"label_confidence": 0.736,
"severity": "medium",
"timestamp": "2026-01-07T01:56:00Z",
"trace_id": "115f11f8-e5b2-1be4-ee5f-1db211bfdc44"
} | {
"account_age_days": 1518,
"account_id": "ACCT-886E270E60C3",
"baseline_risk_score": 0.089,
"kyc_tier": "tier_3",
"session_entropy": 0.303
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 755,
"timestamp": "2026-01-07T01:56:00Z",
"transaction_amount_usd": 14652.69
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.475,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3011.81,
"financial_exposure_usd": 3431.7,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103313",
"label": "fraudulent",
"label_confidence": 0.796,
"severity": "medium",
"timestamp": "2026-01-03T07:13:00Z",
"trace_id": "bfb34506-d752-7114-d6df-490d590a8238"
} | {
"account_age_days": 1350,
"account_id": "ACCT-CE1287E09469",
"baseline_risk_score": 0.48,
"kyc_tier": "tier_2",
"session_entropy": 0.101
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "US",
"latency_ms": 167,
"timestamp": "2026-01-02T18:33:00Z",
"transaction_amount_usd": 17.54
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.769,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 102757.41,
"financial_exposure_usd": 124763.61,
"recoverable_pct": 0.111
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107079",
"label": "benign",
"label_confidence": 0.58,
"severity": "low",
"timestamp": "2026-01-05T21:59:00Z",
"trace_id": "b1bcdc91-06c2-6eef-3087-25b8cd6bcc77"
} | {
"account_age_days": 428,
"account_id": "ACCT-F27EF94D8F59",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.759
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 556,
"timestamp": "2026-01-05T21:59:00Z",
"transaction_amount_usd": 4870.45
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.623,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 6192.25,
"financial_exposure_usd": 6647.88,
"recoverable_pct": 0.978
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107694",
"label": "benign",
"label_confidence": 0.531,
"severity": "low",
"timestamp": "2026-01-06T08:14:00Z",
"trace_id": "fe7c07da-e70c-ae79-bb04-e61f5ceb7530"
} | {
"account_age_days": 1856,
"account_id": "ACCT-8E087963A8D4",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.148
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 560,
"timestamp": "2026-01-06T08:14:00Z",
"transaction_amount_usd": 1609
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.577,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 470.47,
"financial_exposure_usd": 1074.22,
"recoverable_pct": 0.666
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105147",
"label": "fraudulent",
"label_confidence": 0.862,
"severity": "high",
"timestamp": "2026-01-04T13:47:00Z",
"trace_id": "2d0d5b99-8e91-8eba-5142-4ecc31a382e7"
} | {
"account_age_days": 1456,
"account_id": "ACCT-4C5D7D28D941",
"baseline_risk_score": 0.152,
"kyc_tier": "tier_1",
"session_entropy": 0.847
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 358,
"timestamp": "2026-01-04T13:47:00Z",
"transaction_amount_usd": 1583098.55
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.48,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND post... | {
"customer_funds_at_risk_usd": 2505744.91,
"financial_exposure_usd": 2912498.05,
"recoverable_pct": 0.58
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108987",
"label": "benign",
"label_confidence": 0.646,
"severity": "high",
"timestamp": "2026-01-07T05:47:00Z",
"trace_id": "be1ba074-1b11-7fa2-de85-1edbfc4a3833"
} | {
"account_age_days": 905,
"account_id": "ACCT-67E2D592BE43",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.878
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 393,
"timestamp": "2026-01-06T21:48:00Z",
"transaction_amount_usd": 24.98
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.731,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 5103.83,
"financial_exposure_usd": 6659.55,
"recoverable_pct": 0.762
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104497",
"label": "fraudulent",
"label_confidence": 0.874,
"severity": "medium",
"timestamp": "2026-01-04T02:57:00Z",
"trace_id": "f80a7f5b-0d4b-410d-e832-8cd3d5184f73"
} | {
"account_age_days": 1398,
"account_id": "ACCT-041737CC93FC",
"baseline_risk_score": 0.213,
"kyc_tier": "tier_2",
"session_entropy": 0.882
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "FR",
"latency_ms": 1167,
"timestamp": "2026-01-04T02:57:00Z",
"transaction_amount_usd": 89572.18
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.87,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3496516.61,
"financial_exposure_usd": 3691997.01,
"recoverable_pct": 0.401
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101855",
"label": "fraudulent",
"label_confidence": 0.932,
"severity": "high",
"timestamp": "2026-01-02T06:55:00Z",
"trace_id": "d5795434-39b4-df31-2ed3-cf807cb6e7b8"
} | {
"account_age_days": 462,
"account_id": "ACCT-34FF9135DBD9",
"baseline_risk_score": 0.497,
"kyc_tier": "tier_3",
"session_entropy": 0.607
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "SG",
"latency_ms": 380,
"timestamp": "2026-01-02T03:23:00Z",
"transaction_amount_usd": 18.88
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.66,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAV... | {
"customer_funds_at_risk_usd": 205132.42,
"financial_exposure_usd": 285927.46,
"recoverable_pct": 0.158
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108027",
"label": "benign",
"label_confidence": 0.46,
"severity": "critical",
"timestamp": "2026-01-06T13:47:00Z",
"trace_id": "a7299603-6a30-9906-87a5-818c864e110f"
} | {
"account_age_days": 157,
"account_id": "ACCT-C459BADFB595",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.27
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 562,
"timestamp": "2026-01-06T13:47:00Z",
"transaction_amount_usd": 4500.73
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.551,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3072.33,
"financial_exposure_usd": 5540.95,
"recoverable_pct": 0.653
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102310",
"label": "fraudulent",
"label_confidence": 0.812,
"severity": "critical",
"timestamp": "2026-01-02T14:30:00Z",
"trace_id": "fdf5cbf6-43fa-9cb8-1414-b4c8a9631d41"
} | {
"account_age_days": 82,
"account_id": "ACCT-D718F6C89D09",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_3",
"session_entropy": 0.495
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 497,
"timestamp": "2026-01-02T14:30:00Z",
"transaction_amount_usd": 28265.04
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.721,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 1248062.09,
"financial_exposure_usd": 1347161.88,
"recoverable_pct": 0.156
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103846",
"label": "fraudulent",
"label_confidence": 0.85,
"severity": "medium",
"timestamp": "2026-01-03T16:06:00Z",
"trace_id": "6e380ad1-2ad7-f3eb-5506-d2956bcb01f9"
} | {
"account_age_days": 192,
"account_id": "ACCT-EFE71C698D05",
"baseline_risk_score": 0.226,
"kyc_tier": "tier_2",
"session_entropy": 0.849
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 195,
"timestamp": "2026-01-03T08:55:00Z",
"transaction_amount_usd": 13.33
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.755,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 4698026.55,
"financial_exposure_usd": 5201932.17,
"recoverable_pct": 0.714
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105636",
"label": "fraudulent",
"label_confidence": 0.636,
"severity": "medium",
"timestamp": "2026-01-04T21:56:00Z",
"trace_id": "412abeba-7350-acb1-111e-3109d5a2b17d"
} | {
"account_age_days": 1665,
"account_id": "ACCT-9DE8757199B1",
"baseline_risk_score": 0.077,
"kyc_tier": "tier_3",
"session_entropy": 0.875
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 576,
"timestamp": "2026-01-04T21:56:00Z",
"transaction_amount_usd": 2715763.58
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.894,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3244476.79,
"financial_exposure_usd": 7300812.88,
"recoverable_pct": 0.523
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102656",
"label": "fraudulent",
"label_confidence": 0.808,
"severity": "medium",
"timestamp": "2026-01-02T20:16:00Z",
"trace_id": "9d83b8c6-6c1e-fcce-85d2-c631317a2e44"
} | {
"account_age_days": 1199,
"account_id": "ACCT-50BACF3A3C9C",
"baseline_risk_score": 0.617,
"kyc_tier": "tier_1",
"session_entropy": 0.731
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 987,
"timestamp": "2026-01-02T20:16:00Z",
"transaction_amount_usd": 41944.1
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.764,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 352945.61,
"financial_exposure_usd": 714561.86,
"recoverable_pct": 0.625
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106584",
"label": "fraudulent",
"label_confidence": 0.926,
"severity": "medium",
"timestamp": "2026-01-05T13:44:00Z",
"trace_id": "947867a4-3882-1f6a-28bf-a89a3e050b68"
} | {
"account_age_days": 1975,
"account_id": "ACCT-E08782EEB20D",
"baseline_risk_score": 0.16,
"kyc_tier": "tier_3",
"session_entropy": 0.92
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 561,
"timestamp": "2026-01-05T13:44:00Z",
"transaction_amount_usd": 2797193.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.604,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 1302285.12,
"financial_exposure_usd": 2756473.54,
"recoverable_pct": 0.787
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108185",
"label": "benign",
"label_confidence": 0.603,
"severity": "low",
"timestamp": "2026-01-06T16:25:00Z",
"trace_id": "1bed1d1d-0c60-c68b-b4ab-6e4d284a237f"
} | {
"account_age_days": 1254,
"account_id": "ACCT-D4F0BF7B3F5C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.47
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 230,
"timestamp": "2026-01-06T08:59:00Z",
"transaction_amount_usd": 9.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.529,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 3194.85,
"financial_exposure_usd": 4815.96,
"recoverable_pct": 0.901
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105889",
"label": "fraudulent",
"label_confidence": 0.921,
"severity": "medium",
"timestamp": "2026-01-05T02:09:00Z",
"trace_id": "b634b52c-6fbb-4ffb-c113-ed7e7e561a02"
} | {
"account_age_days": 1676,
"account_id": "ACCT-29998CDC2ABF",
"baseline_risk_score": 0.371,
"kyc_tier": "tier_3",
"session_entropy": 0.668
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "US",
"latency_ms": 812,
"timestamp": "2026-01-05T02:09:00Z",
"transaction_amount_usd": 2443786.85
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.767,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 5828287.1,
"financial_exposure_usd": 6460326.84,
"recoverable_pct": 0.866
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100220",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "high",
"timestamp": "2026-01-01T03:40:00Z",
"trace_id": "f0071d3b-5c99-d8ab-a028-dc87d6fb3a95"
} | {
"account_age_days": 518,
"account_id": "ACCT-9DCA34888459",
"baseline_risk_score": 0.286,
"kyc_tier": "tier_3",
"session_entropy": 0.637
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 888,
"timestamp": "2026-01-01T03:40:00Z",
"transaction_amount_usd": 49063.78
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.91,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 783244.88,
"financial_exposure_usd": 1035134.11,
"recoverable_pct": 0.194
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109348",
"label": "benign",
"label_confidence": 0.694,
"severity": "low",
"timestamp": "2026-01-07T11:48:00Z",
"trace_id": "1452f4dd-7b96-f6b3-c19a-6c3a33a5f7d7"
} | {
"account_age_days": 1783,
"account_id": "ACCT-73954A0C84ED",
"baseline_risk_score": 0.193,
"kyc_tier": "tier_3",
"session_entropy": 0.636
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 368,
"timestamp": "2026-01-07T05:40:00Z",
"transaction_amount_usd": 17.7
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.485,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3700.02,
"financial_exposure_usd": 3733.73,
"recoverable_pct": 0.947
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108263",
"label": "benign",
"label_confidence": 0.537,
"severity": "medium",
"timestamp": "2026-01-06T17:43:00Z",
"trace_id": "d7b6e418-6a0f-27c8-56ab-e6ee71e9d502"
} | {
"account_age_days": 1299,
"account_id": "ACCT-4BBA16188176",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.323
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 443,
"timestamp": "2026-01-06T17:43:00Z",
"transaction_amount_usd": 7005.32
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.546,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2262.13,
"financial_exposure_usd": 2374.54,
"recoverable_pct": 0.713
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102262",
"label": "fraudulent",
"label_confidence": 0.875,
"severity": "high",
"timestamp": "2026-01-02T13:42:00Z",
"trace_id": "d6ffd771-39f9-30ee-572e-f7e0bfdf8c1e"
} | {
"account_age_days": 1038,
"account_id": "ACCT-D2676C18C601",
"baseline_risk_score": 0.556,
"kyc_tier": "tier_1",
"session_entropy": 0.925
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "BR",
"latency_ms": 266,
"timestamp": "2026-01-02T13:42:00Z",
"transaction_amount_usd": 36479.26
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.927,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 500030.18,
"financial_exposure_usd": 1138907.21,
"recoverable_pct": 0.27
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109979",
"label": "benign",
"label_confidence": 0.549,
"severity": "low",
"timestamp": "2026-01-07T22:19:00Z",
"trace_id": "c569a8c1-9b4e-42d0-0be0-c92860c4a576"
} | {
"account_age_days": 1289,
"account_id": "ACCT-C624823D16C6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.5
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ID",
"latency_ms": 107,
"timestamp": "2026-01-07T22:19:00Z",
"transaction_amount_usd": 9297.66
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1740.8,
"financial_exposure_usd": 1909.73,
"recoverable_pct": 0.493
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107392",
"label": "benign",
"label_confidence": 0.619,
"severity": "low",
"timestamp": "2026-01-06T03:12:00Z",
"trace_id": "112d42fc-1db6-b9e8-1d72-470930723123"
} | {
"account_age_days": 1689,
"account_id": "ACCT-7E67D1B7B59C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.459
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 180,
"timestamp": "2026-01-06T03:12:00Z",
"transaction_amount_usd": 7180.23
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.644,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1511.28,
"financial_exposure_usd": 2685.41,
"recoverable_pct": 0.702
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102892",
"label": "fraudulent",
"label_confidence": 0.794,
"severity": "high",
"timestamp": "2026-01-03T00:12:00Z",
"trace_id": "bb9220a8-49d1-59ff-ec4b-8c79c1652c58"
} | {
"account_age_days": 201,
"account_id": "ACCT-87A62F7B47E6",
"baseline_risk_score": 0.257,
"kyc_tier": "tier_3",
"session_entropy": 0.343
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 1071,
"timestamp": "2026-01-03T00:12:00Z",
"transaction_amount_usd": 53852.45
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.602,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 321716.21,
"financial_exposure_usd": 440161.04,
"recoverable_pct": 0.538
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.